CVE-2023-52567 (GCVE-0-2023-52567)
Vulnerability from cvelistv5
Published
2024-03-02 21:59
Modified
2025-05-04 12:49
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: serial: 8250_port: Check IRQ data before use In case the leaf driver wants to use IRQ polling (irq = 0) and IIR register shows that an interrupt happened in the 8250 hardware the IRQ data can be NULL. In such a case we need to skip the wake event as we came to this path from the timer interrupt and quite likely system is already awake. Without this fix we have got an Oops: serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A ... BUG: kernel NULL pointer dereference, address: 0000000000000010 RIP: 0010:serial8250_handle_irq+0x7c/0x240 Call Trace: ? serial8250_handle_irq+0x7c/0x240 ? __pfx_serial8250_timeout+0x10/0x10
Impacted products
Vendor Product Version
Linux Linux Version: edfe57aedff4ecf3606533aabf8ecf7676c3c5d9
Version: 0bd49a043c7984c93c2a0af41222fb71c3986a4e
Version: 572d48361aa0a6e6f16c1470e5407de183493d0c
Version: d5d628fea5f6181809a9d61b04de6ade53277684
Version: 424cf29296354d7b9c6c038aaa7bb71782100851
Version: 727e92fe13e81c6088a88d83e466b2b1b553c4e3
Version: 0ba9e3a13c6adfa99e32b2576d20820ab10ad48a
Version: 0ba9e3a13c6adfa99e32b2576d20820ab10ad48a
Version: d7c6aa39eb041e2a6a53106104200d11e2acc87f
Version: f5fd2fd999b364801e9790c6f69f3fe3f40ed60f
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-52567",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-21T16:12:47.412833Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-21T16:12:54.742Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:03:20.694Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/tty/serial/8250/8250_port.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "ee5732caaffba3a37e753fdb89b4958db9a61847",
              "status": "affected",
              "version": "edfe57aedff4ecf3606533aabf8ecf7676c3c5d9",
              "versionType": "git"
            },
            {
              "lessThan": "c334650150c29234b0923476f51573ae1b2f252a",
              "status": "affected",
              "version": "0bd49a043c7984c93c2a0af41222fb71c3986a4e",
              "versionType": "git"
            },
            {
              "lessThan": "bf3c728e3692cc6d998874f0f27d433117348742",
              "status": "affected",
              "version": "572d48361aa0a6e6f16c1470e5407de183493d0c",
              "versionType": "git"
            },
            {
              "lessThan": "e14afa4450cb7e4cf93e993a765801203d41d014",
              "status": "affected",
              "version": "d5d628fea5f6181809a9d61b04de6ade53277684",
              "versionType": "git"
            },
            {
              "lessThan": "2b837f13a818f96304736453ac53b66a70aaa4f2",
              "status": "affected",
              "version": "424cf29296354d7b9c6c038aaa7bb71782100851",
              "versionType": "git"
            },
            {
              "lessThan": "e14f68a48fd445a083ac0750fafcb064df5f18f7",
              "status": "affected",
              "version": "727e92fe13e81c6088a88d83e466b2b1b553c4e3",
              "versionType": "git"
            },
            {
              "lessThan": "3345cc5f02f1fb4c4dcb114706f2210d879ab933",
              "status": "affected",
              "version": "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a",
              "versionType": "git"
            },
            {
              "lessThan": "cce7fc8b29961b64fadb1ce398dc5ff32a79643b",
              "status": "affected",
              "version": "0ba9e3a13c6adfa99e32b2576d20820ab10ad48a",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d7c6aa39eb041e2a6a53106104200d11e2acc87f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "f5fd2fd999b364801e9790c6f69f3fe3f40ed60f",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/tty/serial/8250/8250_port.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.4"
            },
            {
              "lessThan": "6.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.327",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.296",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.258",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.198",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.134",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.56",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.327",
                  "versionStartIncluding": "4.14.315",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.296",
                  "versionStartIncluding": "4.19.283",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.258",
                  "versionStartIncluding": "5.4.243",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.198",
                  "versionStartIncluding": "5.10.180",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.134",
                  "versionStartIncluding": "5.15.111",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.56",
                  "versionStartIncluding": "6.1.28",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5.6",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.2.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.3.2",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250_port: Check IRQ data before use\n\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\nIIR register shows that an interrupt happened in the 8250 hardware\nthe IRQ data can be NULL. In such a case we need to skip the wake\nevent as we came to this path from the timer interrupt and quite\nlikely system is already awake.\n\nWithout this fix we have got an Oops:\n\n    serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\n    ...\n    BUG: kernel NULL pointer dereference, address: 0000000000000010\n    RIP: 0010:serial8250_handle_irq+0x7c/0x240\n    Call Trace:\n     ? serial8250_handle_irq+0x7c/0x240\n     ? __pfx_serial8250_timeout+0x10/0x10"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:49:17.520Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847"
        },
        {
          "url": "https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a"
        },
        {
          "url": "https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742"
        },
        {
          "url": "https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014"
        },
        {
          "url": "https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2"
        },
        {
          "url": "https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7"
        },
        {
          "url": "https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933"
        },
        {
          "url": "https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b"
        }
      ],
      "title": "serial: 8250_port: Check IRQ data before use",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-52567",
    "datePublished": "2024-03-02T21:59:38.815Z",
    "dateReserved": "2024-03-02T21:55:42.567Z",
    "dateUpdated": "2025-05-04T12:49:17.520Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T23:03:20.694Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-52567\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-21T16:12:47.412833Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-21T16:12:51.987Z\"}}], \"cna\": {\"title\": \"serial: 8250_port: Check IRQ data before use\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"edfe57aedff4ecf3606533aabf8ecf7676c3c5d9\", \"lessThan\": \"ee5732caaffba3a37e753fdb89b4958db9a61847\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0bd49a043c7984c93c2a0af41222fb71c3986a4e\", \"lessThan\": \"c334650150c29234b0923476f51573ae1b2f252a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"572d48361aa0a6e6f16c1470e5407de183493d0c\", \"lessThan\": \"bf3c728e3692cc6d998874f0f27d433117348742\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d5d628fea5f6181809a9d61b04de6ade53277684\", \"lessThan\": \"e14afa4450cb7e4cf93e993a765801203d41d014\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"424cf29296354d7b9c6c038aaa7bb71782100851\", \"lessThan\": \"2b837f13a818f96304736453ac53b66a70aaa4f2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"727e92fe13e81c6088a88d83e466b2b1b553c4e3\", \"lessThan\": \"e14f68a48fd445a083ac0750fafcb064df5f18f7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0ba9e3a13c6adfa99e32b2576d20820ab10ad48a\", \"lessThan\": \"3345cc5f02f1fb4c4dcb114706f2210d879ab933\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0ba9e3a13c6adfa99e32b2576d20820ab10ad48a\", \"lessThan\": \"cce7fc8b29961b64fadb1ce398dc5ff32a79643b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d7c6aa39eb041e2a6a53106104200d11e2acc87f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f5fd2fd999b364801e9790c6f69f3fe3f40ed60f\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/tty/serial/8250/8250_port.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.14.327\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.296\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.258\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.198\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.134\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.56\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.5.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/tty/serial/8250/8250_port.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847\"}, {\"url\": \"https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a\"}, {\"url\": \"https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742\"}, {\"url\": \"https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014\"}, {\"url\": \"https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2\"}, {\"url\": \"https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7\"}, {\"url\": \"https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933\"}, {\"url\": \"https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nserial: 8250_port: Check IRQ data before use\\n\\nIn case the leaf driver wants to use IRQ polling (irq = 0) and\\nIIR register shows that an interrupt happened in the 8250 hardware\\nthe IRQ data can be NULL. In such a case we need to skip the wake\\nevent as we came to this path from the timer interrupt and quite\\nlikely system is already awake.\\n\\nWithout this fix we have got an Oops:\\n\\n    serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A\\n    ...\\n    BUG: kernel NULL pointer dereference, address: 0000000000000010\\n    RIP: 0010:serial8250_handle_irq+0x7c/0x240\\n    Call Trace:\\n     ? serial8250_handle_irq+0x7c/0x240\\n     ? __pfx_serial8250_timeout+0x10/0x10\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.327\", \"versionStartIncluding\": \"4.14.315\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.296\", \"versionStartIncluding\": \"4.19.283\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.258\", \"versionStartIncluding\": \"5.4.243\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.198\", \"versionStartIncluding\": \"5.10.180\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.134\", \"versionStartIncluding\": \"5.15.111\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.56\", \"versionStartIncluding\": \"6.1.28\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.5.6\", \"versionStartIncluding\": \"6.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6\", \"versionStartIncluding\": \"6.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.2.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"6.3.2\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:49:17.520Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-52567\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:49:17.520Z\", \"dateReserved\": \"2024-03-02T21:55:42.567Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-02T21:59:38.815Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…