CVE-2023-53789NULL Pointer Dereference in Linux

Severity
5.8MEDIUM
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Improve page fault error reporting If IOMMU domain for device group is not setup properly then we may hit IOMMU page fault. Current page fault handler assumes that domain is always setup and it will hit NULL pointer derefence (see below sample log). Lets check whether domain is setup or not and log appropriate message. Sample log: amdgpu 0000:00:01.0: amdgpu: SE 1, SH per SE 1, CU per SH 8, active_cu_number 6 BUG:

Affected Packages4 packages

Linuxlinux/linux_kernel5.16.06.1.16+1
Debianlinux/linux_kernel< 6.1.20-1+2
CVEListV5linux/linux9f78e446bde812d18f228976f2c6b8f25b93f08bbe8301e2d5a8b95c04ae8e35d7bfee7b0f03f83a+3
debiandebian/linux< linux 6.1.20-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-53789: In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Improve page fault error reporting If IOMMU domain for device group is2025-12-09
OSV
iommu/amd: Improve page fault error reporting2025-12-09
GHSA
GHSA-p3hr-pr7r-f6m2: In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Improve page fault error reporting If IOMMU domain for device group i2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: iommu/amd: Improve page fault error reporting2025-12-09
Debian
CVE-2023-53789: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/amd: ...2023