CVE-2023-53327Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: iommufd/selftest: Catch overflow of uptr and length syzkaller hits a WARN_ON when trying to have a uptr close to UINTPTR_MAX: WARNING: CPU: 1 PID: 393 at drivers/iommu/iommufd/selftest.c:403 iommufd_test+0xb19/0x16f0 Modules linked in: CPU: 1 PID: 393 Comm: repro Not tainted 6.2.0-c9c3395d5e3d #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP: 0010:iommu

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel6.26.2.15+1
Debianlinux/linux_kernel< 6.3.7-1+1
CVEListV5linux/linuxf4b20bb34c83dceade5470288f48f94ce3598adaadac6508c235a092b91ed9c0110ecf140e9e9441+3
debiandebian/linux< linux 6.3.7-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-53327: In the Linux kernel, the following vulnerability has been resolved: iommufd/selftest: Catch overflow of uptr and length syzkaller hits a WARN_ON when2025-09-16
GHSA
GHSA-5j3v-w49r-w347: In the Linux kernel, the following vulnerability has been resolved: iommufd/selftest: Catch overflow of uptr and length syzkaller hits a WARN_ON whe2025-09-16

📋Vendor Advisories

2
Red Hat
kernel: iommufd/selftest: Catch overflow of uptr and length2025-09-16
Debian
CVE-2023-53327: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd/sel...2023
CVE-2023-53327 — Linux vulnerability | cvebase