CVE-2023-53332

Source
https://cve.org/CVERecord?id=CVE-2023-53332
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53332.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53332
Downstream
Related
Published
2025-09-16T16:12:07.573Z
Modified
2026-03-20T12:33:05.795474Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask()
Details

In the Linux kernel, the following vulnerability has been resolved:

genirq/ipi: Fix NULL pointer deref in irqdatagetaffinitymask()

If ipisend{mask|single}() is called with an invalid interrupt number, all the local variables there will be NULL. ipisendverify() which is invoked from these functions does verify its 'data' parameter, resulting in a kernel oops in irqdatagetaffinitymask() as the passed NULL pointer gets dereferenced.

Add a missing NULL pointer check in ipisendverify()...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53332.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3b8e29a82dd16c1f2061e0b955a71cd36eeb061b
Fixed
926aef60ea64cd9becf2829f7388f48dbe8bcb11
Fixed
7448c73d64075051f50caed2c62f46553b69ab8a
Fixed
feabecaff5902f896531dde90646ca5dfa9d4f7d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53332.json"