-
CVE-2023-54220
- EPSS 0.04%
- Veröffentlicht 30.12.2025 12:11:15
- Zuletzt bearbeitet 31.12.2025 20:42:43
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250: Fix oops for port->pm on uart_change_pm()
Unloading a hardware specific 8250 driver can produce error "Unable to
handle kernel paging request at virtual address" about ten seconds after
unloading the driver. This happens on uart_hangup() calling
uart_change_pm().
Turns out commit 04e82793f068 ("serial: 8250: Reinit port->pm on port
specific driver unbind") was only a partial fix. If the hardware specific
driver has initialized port->pm function, we need to clear port->pm too.
Just reinitializing port->ops does not do this. Otherwise serial8250_pm()
will call port->pm() instead of serial8250_do_pm().Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
66f3e55960698c874b0598277913b478ecd29573
Version
490bf37eaabb0a857ed1ae8e75d8854e41662f1c
Status
affected
Version <
720a297b334e85d34099e83d1f375b92c3efedd6
Version
c9e080c3005fd183c56ff8f4d75edb5da0765d2c
Status
affected
Version <
b653289ca6460a6552c8590b75dfa84a0140a46b
Version
d5cd2928d31042a7c0a01464f9a8d95be736421d
Status
affected
Version <
bd70d0b28010d560a8be96b44fea86fe2ba016ae
Version
2c86a1305c1406f45ea780d06953c484ea1d9e6e
Status
affected
Version <
18e27df4f2b4e257c317ba8076f31a888f6cc64b
Version
1ba5594739d858e524ff0f398ee1ebfe0a8b9d41
Status
affected
Version <
0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c
Version
af4d6dbb1a92ea424ad1ba1d0c88c7fa2345d872
Status
affected
Version <
375806616f8c772c33d40e112530887b37c1a816
Version
04e82793f068d2f0ffe62fcea03d007a8cdc16a7
Status
affected
Version <
dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534
Version
04e82793f068d2f0ffe62fcea03d007a8cdc16a7
Status
affected
Version
8e596aed5f2f98cf3e6e98d6fe1d689f4a319308
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.4
Status
affected
Version <
6.4
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.324
Status
unaffected
Version <=
4.19.*
Version
4.19.293
Status
unaffected
Version <=
5.4.*
Version
5.4.255
Status
unaffected
Version <=
5.10.*
Version
5.10.192
Status
unaffected
Version <=
5.15.*
Version
5.15.128
Status
unaffected
Version <=
6.1.*
Version
6.1.47
Status
unaffected
Version <=
6.4.*
Version
6.4.12
Status
unaffected
Version <=
*
Version
6.5
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|