Home

Description

In the Linux kernel, the following vulnerability has been resolved: serial: 8250: Fix oops for port->pm on uart_change_pm() Unloading a hardware specific 8250 driver can produce error "Unable to handle kernel paging request at virtual address" about ten seconds after unloading the driver. This happens on uart_hangup() calling uart_change_pm(). Turns out commit 04e82793f068 ("serial: 8250: Reinit port->pm on port specific driver unbind") was only a partial fix. If the hardware specific driver has initialized port->pm function, we need to clear port->pm too. Just reinitializing port->ops does not do this. Otherwise serial8250_pm() will call port->pm() instead of serial8250_do_pm().

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

490bf37eaabb0a857ed1ae8e75d8854e41662f1c (git) before 66f3e55960698c874b0598277913b478ecd29573
affected

c9e080c3005fd183c56ff8f4d75edb5da0765d2c (git) before 720a297b334e85d34099e83d1f375b92c3efedd6
affected

d5cd2928d31042a7c0a01464f9a8d95be736421d (git) before b653289ca6460a6552c8590b75dfa84a0140a46b
affected

2c86a1305c1406f45ea780d06953c484ea1d9e6e (git) before bd70d0b28010d560a8be96b44fea86fe2ba016ae
affected

1ba5594739d858e524ff0f398ee1ebfe0a8b9d41 (git) before 18e27df4f2b4e257c317ba8076f31a888f6cc64b
affected

af4d6dbb1a92ea424ad1ba1d0c88c7fa2345d872 (git) before 0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c
affected

04e82793f068d2f0ffe62fcea03d007a8cdc16a7 (git) before 375806616f8c772c33d40e112530887b37c1a816
affected

04e82793f068d2f0ffe62fcea03d007a8cdc16a7 (git) before dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534
affected

8e596aed5f2f98cf3e6e98d6fe1d689f4a319308 (git)
affected

Default status
affected

6.4
affected

Any version before 6.4
unaffected

4.14.324 (semver)
unaffected

4.19.293 (semver)
unaffected

5.4.255 (semver)
unaffected

5.10.192 (semver)
unaffected

5.15.128 (semver)
unaffected

6.1.47 (semver)
unaffected

6.4.12 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/66f3e55960698c874b0598277913b478ecd29573

git.kernel.org/...c/720a297b334e85d34099e83d1f375b92c3efedd6

git.kernel.org/...c/b653289ca6460a6552c8590b75dfa84a0140a46b

git.kernel.org/...c/bd70d0b28010d560a8be96b44fea86fe2ba016ae

git.kernel.org/...c/18e27df4f2b4e257c317ba8076f31a888f6cc64b

git.kernel.org/...c/0c05493341d6f2097f75f0a5dbb7b53a9e8c5f6c

git.kernel.org/...c/375806616f8c772c33d40e112530887b37c1a816

git.kernel.org/...c/dfe2aeb226fd5e19b0ee795f4f6ed8bc494c1534

cve.org (CVE-2023-54220)

nvd.nist.gov (CVE-2023-54220)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.