CVE-2023-53332

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53332
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53332.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53332
Downstream
Published
2025-09-16T16:12:07Z
Modified
2025-10-14T10:30:25.314308Z
Summary
genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask()
Details

In the Linux kernel, the following vulnerability has been resolved:

genirq/ipi: Fix NULL pointer deref in irqdatagetaffinitymask()

If ipisend{mask|single}() is called with an invalid interrupt number, all the local variables there will be NULL. ipisendverify() which is invoked from these functions does verify its 'data' parameter, resulting in a kernel oops in irqdatagetaffinitymask() as the passed NULL pointer gets dereferenced.

Add a missing NULL pointer check in ipisendverify()...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b
Fixed
926aef60ea64cd9becf2829f7388f48dbe8bcb11
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b
Fixed
7448c73d64075051f50caed2c62f46553b69ab8a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b
Fixed
feabecaff5902f896531dde90646ca5dfa9d4f7d

Affected versions

v4.*

v4.10
v4.10-rc1
v4.10-rc2
v4.10-rc3
v4.10-rc4
v4.10-rc5
v4.10-rc6
v4.10-rc7
v4.10-rc8
v4.11
v4.11-rc1
v4.11-rc2
v4.11-rc3
v4.11-rc4
v4.11-rc5
v4.11-rc6
v4.11-rc7
v4.11-rc8
v4.12
v4.12-rc1
v4.12-rc2
v4.12-rc3
v4.12-rc4
v4.12-rc5
v4.12-rc6
v4.12-rc7
v4.13
v4.13-rc1
v4.13-rc2
v4.13-rc3
v4.13-rc4
v4.13-rc5
v4.13-rc6
v4.13-rc7
v4.14
v4.14-rc1
v4.14-rc2
v4.14-rc3
v4.14-rc4
v4.14-rc5
v4.14-rc6
v4.14-rc7
v4.14-rc8
v4.15
v4.15-rc1
v4.15-rc2
v4.15-rc3
v4.15-rc4
v4.15-rc5
v4.15-rc6
v4.15-rc7
v4.15-rc8
v4.15-rc9
v4.16
v4.16-rc1
v4.16-rc2
v4.16-rc3
v4.16-rc4
v4.16-rc5
v4.16-rc6
v4.16-rc7
v4.17
v4.17-rc1
v4.17-rc2
v4.17-rc3
v4.17-rc4
v4.17-rc5
v4.17-rc6
v4.17-rc7
v4.18
v4.18-rc1
v4.18-rc2
v4.18-rc3
v4.18-rc4
v4.18-rc5
v4.18-rc6
v4.18-rc7
v4.18-rc8
v4.19
v4.19-rc1
v4.19-rc2
v4.19-rc3
v4.19-rc4
v4.19-rc5
v4.19-rc6
v4.19-rc7
v4.19-rc8
v4.20
v4.20-rc1
v4.20-rc2
v4.20-rc3
v4.20-rc4
v4.20-rc5
v4.20-rc6
v4.20-rc7
v4.5
v4.5-rc4
v4.5-rc5
v4.5-rc6
v4.5-rc7
v4.6
v4.6-rc1
v4.6-rc2
v4.6-rc3
v4.6-rc4
v4.6-rc5
v4.6-rc6
v4.6-rc7
v4.7
v4.7-rc1
v4.7-rc2
v4.7-rc3
v4.7-rc4
v4.7-rc5
v4.7-rc6
v4.7-rc7
v4.8
v4.8-rc1
v4.8-rc2
v4.8-rc3
v4.8-rc4
v4.8-rc5
v4.8-rc6
v4.8-rc7
v4.8-rc8
v4.9
v4.9-rc1
v4.9-rc2
v4.9-rc3
v4.9-rc4
v4.9-rc5
v4.9-rc6
v4.9-rc7
v4.9-rc8

v5.*

v5.0
v5.0-rc1
v5.0-rc2
v5.0-rc3
v5.0-rc4
v5.0-rc5
v5.0-rc6
v5.0-rc7
v5.0-rc8
v5.1
v5.1-rc1
v5.1-rc2
v5.1-rc3
v5.1-rc4
v5.1-rc5
v5.1-rc6
v5.1-rc7
v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.2
v5.2-rc1
v5.2-rc2
v5.2-rc3
v5.2-rc4
v5.2-rc5
v5.2-rc6
v5.2-rc7
v5.3
v5.3-rc1
v5.3-rc2
v5.3-rc3
v5.3-rc4
v5.3-rc5
v5.3-rc6
v5.3-rc7
v5.3-rc8
v5.4
v5.4-rc1
v5.4-rc2
v5.4-rc3
v5.4-rc4
v5.4-rc5
v5.4-rc6
v5.4-rc7
v5.4-rc8
v5.5
v5.5-rc1
v5.5-rc2
v5.5-rc3
v5.5-rc4
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2
v6.2.3
v6.2.4

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7448c73d64075051f50caed2c62f46553b69ab8a",
            "deprecated": false,
            "id": "CVE-2023-53332-299dd54a",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "10671342672986462575012605616649212476",
                    "338348849271926039097869621456091433482",
                    "267633414726886697282992268671453451247",
                    "240852056106701338525880375535452733305",
                    "172188229293862643186705121015344474800",
                    "280681095029075750467507965720449272491",
                    "189693180864319005511669862130925506342",
                    "252239143648488942078519743773908743104"
                ]
            },
            "target": {
                "file": "kernel/irq/ipi.c"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@feabecaff5902f896531dde90646ca5dfa9d4f7d",
            "deprecated": false,
            "id": "CVE-2023-53332-70e3b5cf",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "10671342672986462575012605616649212476",
                    "338348849271926039097869621456091433482",
                    "267633414726886697282992268671453451247",
                    "240852056106701338525880375535452733305",
                    "172188229293862643186705121015344474800",
                    "280681095029075750467507965720449272491",
                    "189693180864319005511669862130925506342",
                    "252239143648488942078519743773908743104"
                ]
            },
            "target": {
                "file": "kernel/irq/ipi.c"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@926aef60ea64cd9becf2829f7388f48dbe8bcb11",
            "deprecated": false,
            "id": "CVE-2023-53332-8a862c2d",
            "signature_type": "Function",
            "digest": {
                "length": 453.0,
                "function_hash": "63709129130110325499728775278566914926"
            },
            "target": {
                "file": "kernel/irq/ipi.c",
                "function": "ipi_send_verify"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@926aef60ea64cd9becf2829f7388f48dbe8bcb11",
            "deprecated": false,
            "id": "CVE-2023-53332-9bea2f05",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "10671342672986462575012605616649212476",
                    "338348849271926039097869621456091433482",
                    "267633414726886697282992268671453451247",
                    "240852056106701338525880375535452733305",
                    "172188229293862643186705121015344474800",
                    "280681095029075750467507965720449272491",
                    "189693180864319005511669862130925506342",
                    "252239143648488942078519743773908743104"
                ]
            },
            "target": {
                "file": "kernel/irq/ipi.c"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@feabecaff5902f896531dde90646ca5dfa9d4f7d",
            "deprecated": false,
            "id": "CVE-2023-53332-b64555e6",
            "signature_type": "Function",
            "digest": {
                "length": 453.0,
                "function_hash": "63709129130110325499728775278566914926"
            },
            "target": {
                "file": "kernel/irq/ipi.c",
                "function": "ipi_send_verify"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7448c73d64075051f50caed2c62f46553b69ab8a",
            "deprecated": false,
            "id": "CVE-2023-53332-cd8a351c",
            "signature_type": "Function",
            "digest": {
                "length": 453.0,
                "function_hash": "63709129130110325499728775278566914926"
            },
            "target": {
                "file": "kernel/irq/ipi.c",
                "function": "ipi_send_verify"
            }
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.6.0
Fixed
6.1.18
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.5