CVE-2023-54239Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

Severity
4.5MEDIUM
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: iommufd: Check for uptr overflow syzkaller found that setting up a map with a user VA that wraps past zero can trigger WARN_ONs, particularly from pin_user_pages weirdly returning 0 due to invalid arguments. Prevent creating a pages with a uptr and size that would math overflow. WARNING: CPU: 0 PID: 518 at drivers/iommu/iommufd/pages.c:793 pfn_reader_user_pin+0x2e6/0x390 Modules linked in: CPU: 0 PID: 518 Comm: repro Not tai

Affected Packages3 packages

Linuxlinux/linux_kernel6.2.06.2.11
CVEListV5linux/linux8d160cd4d5066f864ec0f2c981470e55ac03ac27800963e7eb001ada8cf2418f159fb649694467f1+2
debiandebian/linux

🔴Vulnerability Details

3
OSV
CVE-2023-54239: In the Linux kernel, the following vulnerability has been resolved: iommufd: Check for uptr overflow syzkaller found that setting up a map with a user2025-12-30
OSV
iommufd: Check for uptr overflow2025-12-30
GHSA
GHSA-xcjh-8fg4-6h7p: In the Linux kernel, the following vulnerability has been resolved: iommufd: Check for uptr overflow syzkaller found that setting up a map with a us2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: iommufd: Check for uptr overflow2025-12-30
Debian
CVE-2023-54239: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd: Ch...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54239 Impact, Exploitability, and Mitigation Steps | Wiz