CVE-2023-54220

Source
https://cve.org/CVERecord?id=CVE-2023-54220
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54220.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54220
Downstream
Related
Published
2025-12-30T12:11:15.385Z
Modified
2026-03-31T17:29:51.521548155Z
Summary
serial: 8250: Fix oops for port->pm on uart_change_pm()
Details

In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: Fix oops for port->pm on uartchangepm()

Unloading a hardware specific 8250 driver can produce error "Unable to handle kernel paging request at virtual address" about ten seconds after unloading the driver. This happens on uarthangup() calling uartchange_pm().

Turns out commit 04e82793f068 ("serial: 8250: Reinit port->pm on port specific driver unbind") was only a partial fix. If the hardware specific driver has initialized port->pm function, we need to clear port->pm too. Just reinitializing port->ops does not do this. Otherwise serial8250pm() will call port->pm() instead of serial8250do_pm().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54220.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
490bf37eaabb0a857ed1ae8e75d8854e41662f1c
Fixed
66f3e55960698c874b0598277913b478ecd29573
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c9e080c3005fd183c56ff8f4d75edb5da0765d2c
Fixed
720a297b334e85d34099e83d1f375b92c3efedd6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d5cd2928d31042a7c0a01464f9a8d95be736421d
Fixed
b653289ca6460a6552c8590b75dfa84a0140a46b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2c86a1305c1406f45ea780d06953c484ea1d9e6e
Fixed
bd70d0b28010d560a8be96b44fea86fe2ba016ae
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1ba5594739d858e524ff0f398ee1ebfe0a8b9d41
Fixed
18e27df4f2b4e257c317ba8076f31a888f6cc64b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
af4d6dbb1a92ea424ad1ba1d0c88c7fa2345d872
Fixed
0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
04e82793f068d2f0ffe62fcea03d007a8cdc16a7
Fixed
375806616f8c772c33d40e112530887b37c1a816
Fixed
dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
8e596aed5f2f98cf3e6e98d6fe1d689f4a319308

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54220.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.14.324
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.293
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.255
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.192
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.128
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.47
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.12

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54220.json"