CVE-2023-54198

Source
https://cve.org/CVERecord?id=CVE-2023-54198
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54198.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54198
Downstream
Related
Published
2025-12-30T12:09:04.229Z
Modified
2026-03-20T12:33:29.592706Z
Summary
tty: fix out-of-bounds access in tty_driver_lookup_tty()
Details

In the Linux kernel, the following vulnerability has been resolved:

tty: fix out-of-bounds access in ttydriverlookup_tty()

When specifying an invalid console= device like console=tty3270, ttydriverlookup_tty() returns the tty struct without checking whether index is a valid number.

To reproduce:

qemu-system-x86_64 -enable-kvm -nographic -serial mon:stdio \ -kernel ../linux-build-x86/arch/x86/boot/bzImage \ -append "console=ttyS0 console=tty3270"

This crashes with:

[ 0.770599] BUG: kernel NULL pointer dereference, address: 00000000000000ef [ 0.771265] #PF: supervisor read access in kernel mode [ 0.771773] #PF: errorcode(0x0000) - not-present page [ 0.772609] Oops: 0000 [#1] PREEMPT SMP PTI [ 0.774878] RIP: 0010:ttyopen+0x268/0x6f0 [ 0.784013] chrdevopen+0xbd/0x230 [ 0.784444] ? cdevdeviceadd+0x80/0x80 [ 0.784920] dodentryopen+0x1e0/0x410 [ 0.785389] pathopenat+0xca9/0x1050 [ 0.785813] dofilpopen+0xaa/0x150 [ 0.786240] fileopenname+0x133/0x1b0 [ 0.786746] filpopen+0x27/0x50 [ 0.787244] consoleonrootfs+0x14/0x4d [ 0.787800] kernelinitfreeable+0x1e4/0x20d [ 0.788383] ? restinit+0xc0/0xc0 [ 0.788881] kernelinit+0x11/0x120 [ 0.789356] retfrom_fork+0x22/0x30

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54198.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
99f1fe189daf8e99a847e420567e49dd7ee2aae7
Fixed
3df6f492f500a16c231f07ccc6f6ed1302caddf9
Fixed
b79109d6470aaae7062998353e3a19449055829d
Fixed
953a4a352a0c185460ae1449e4c6e6658e55fdfc
Fixed
84ea44dc3e4ecb2632586238014bf6722aa5843b
Fixed
f9d9d25ad1f0d060eaf297a2f7f03b5855a45561
Fixed
765566110eb0da3cf60198b0165ecceeaafa6444
Fixed
fcfeaa570f7a5c2d5f4f14931909531ff18b7fde
Fixed
db4df8e9d79e7d37732c1a1b560958e8dadfefa1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54198.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.28
Fixed
4.14.308
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.276
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.100
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.18
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54198.json"