CVE-2023-54034Linux vulnerability

7 documents6 sources
Severity
3.3LOW
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: iommufd: Make sure to zero vfio_iommu_type1_info before copying to user Missed a zero initialization here. Most of the struct is filled with a copy_from_user(), however minsz for that copy is smaller than the actual struct by 8 bytes, thus we don't fill the padding.

Affected Packages3 packages

Linuxlinux/linux_kernel6.2.06.2.3
CVEListV5linux/linuxd624d6652a65ad4f47a58b8651a1ec1163bb81d37adcec686e4d699c169d34c722132b2bce5232cb+2
debiandebian/linux

🔴Vulnerability Details

3
OSV
iommufd: Make sure to zero vfio_iommu_type1_info before copying to user2025-12-24
OSV
CVE-2023-54034: In the Linux kernel, the following vulnerability has been resolved: iommufd: Make sure to zero vfio_iommu_type1_info before copying to user Missed a z2025-12-24
GHSA
GHSA-47gj-cqh4-pq8c: In the Linux kernel, the following vulnerability has been resolved: iommufd: Make sure to zero vfio_iommu_type1_info before copying to user Missed a2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: Kernel (iommufd): Information Disclosure via uninitialized memory padding2025-12-24
Debian
CVE-2023-54034: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd: Ma...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54034 Impact, Exploitability, and Mitigation Steps | Wiz