CVE-2023-53332NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() If ipi_send_{mask|single}() is called with an invalid interrupt number, all the local variables there will be NULL. ipi_send_verify() which is invoked from these functions does verify its 'data' parameter, resulting in a kernel oops in irq_data_get_affinity_mask() as the passed NULL pointer gets dereferenced. Add a missing NULL pointer check in ipi_send_verify

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

NVDlinux/linux_kernel4.66.1.18+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux3b8e29a82dd16c1f2061e0b955a71cd36eeb061b926aef60ea64cd9becf2829f7388f48dbe8bcb11+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4wpf-x7jv-xgqj: In the Linux kernel, the following vulnerability has been resolved: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() If ipi_send_{2025-09-16
OSV
CVE-2023-53332: In the Linux kernel, the following vulnerability has been resolved: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() If ipi_send_{ma2025-09-16

📋Vendor Advisories

3
Red Hat
kernel: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask()2025-09-16
Microsoft
genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask()2025-09-09
Debian
CVE-2023-53332: linux - In the Linux kernel, the following vulnerability has been resolved: genirq/ipi:...2023
CVE-2023-53332 — NULL Pointer Dereference in Linux | cvebase