CVE-2023-53332

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53332
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53332.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53332
Downstream
Related
Published
2025-09-16T16:12:07.573Z
Modified
2025-11-28T02:35:15.161399Z
Summary
genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask()
Details

In the Linux kernel, the following vulnerability has been resolved:

genirq/ipi: Fix NULL pointer deref in irqdatagetaffinitymask()

If ipisend{mask|single}() is called with an invalid interrupt number, all the local variables there will be NULL. ipisendverify() which is invoked from these functions does verify its 'data' parameter, resulting in a kernel oops in irqdatagetaffinitymask() as the passed NULL pointer gets dereferenced.

Add a missing NULL pointer check in ipisendverify()...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53332.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b
Fixed
926aef60ea64cd9becf2829f7388f48dbe8bcb11
Fixed
7448c73d64075051f50caed2c62f46553b69ab8a
Fixed
feabecaff5902f896531dde90646ca5dfa9d4f7d

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.6.0
Fixed
6.1.18
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.5