CVE-2023-53819Out-of-bounds Write in Linux

Severity
7.5HIGH
No vector
EPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va This is motivated by OOB access in amdgpu_vm_update_range when offset_in_bo+map_size overflows. v2: keep the validations in amdgpu_vm_bo_map v3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map rather than to amdgpu_gem_va_ioctl

Affected Packages4 packages

Linuxlinux/linux_kernel4.2.04.19.313+6
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux9f7eb5367d0001536c361bd1400e14521f854ff182aace80cfaab778245bd2f9e31b67953725e4d0+8
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
amdgpu: validate offset_in_bo of drm_amdgpu_gem_va2025-12-09
GHSA
GHSA-c3q3-rmq5-mqm4: In the Linux kernel, the following vulnerability has been resolved: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va This is motivated by OOB acce2025-12-09
OSV
CVE-2023-53819: In the Linux kernel, the following vulnerability has been resolved: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va This is motivated by OOB access2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va2025-12-09
Debian
CVE-2023-53819: linux - In the Linux kernel, the following vulnerability has been resolved: amdgpu: val...2023