CVE-2023-52993

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
27/03/2025
Last modified:
01/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL<br /> <br /> Baoquan reported that after triggering a crash the subsequent crash-kernel<br /> fails to boot about half of the time. It triggers a NULL pointer<br /> dereference in the periodic tick code.<br /> <br /> This happens because the legacy timer interrupt (IRQ0) is resent in<br /> software which happens in soft interrupt (tasklet) context. In this context<br /> get_irq_regs() returns NULL which leads to the NULL pointer dereference.<br /> <br /> The reason for the resend is a spurious APIC interrupt on the IRQ0 vector<br /> which is captured and leads to a resend when the legacy timer interrupt is<br /> enabled. This is wrong because the legacy PIC interrupts are level<br /> triggered and therefore should never be resent in software, but nothing<br /> ever sets the IRQ_LEVEL flag on those interrupts, so the core code does not<br /> know about their trigger type.<br /> <br /> Ensure that IRQ_LEVEL is set when the legacy PCI interrupts are set up.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.18 (including) 4.14.305 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.272 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.231 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.166 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.91 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*