CVE-2023-53327
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/09/2025
Last modified:
17/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommufd/selftest: Catch overflow of uptr and length<br />
<br />
syzkaller hits a WARN_ON when trying to have a uptr close to UINTPTR_MAX:<br />
<br />
WARNING: CPU: 1 PID: 393 at drivers/iommu/iommufd/selftest.c:403 iommufd_test+0xb19/0x16f0<br />
Modules linked in:<br />
CPU: 1 PID: 393 Comm: repro Not tainted 6.2.0-c9c3395d5e3d #1<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014<br />
RIP: 0010:iommufd_test+0xb19/0x16f0<br />
Code: 94 c4 31 ff 44 89 e6 e8 a5 54 17 ff 45 84 e4 0f 85 bb 0b 00 00 41 be fb ff ff ff e8 31 53 17 ff e9 a0 f7 ff ff e8 27 53 17 ff 0b 41 be 8<br />
RSP: 0018:ffffc90000eabdc0 EFLAGS: 00010246<br />
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8214c487<br />
RDX: 0000000000000000 RSI: ffff88800f5c8000 RDI: 0000000000000002<br />
RBP: ffffc90000eabe48 R08: 0000000000000000 R09: 0000000000000001<br />
R10: 0000000000000001 R11: 0000000000000000 R12: 00000000cd2b0000<br />
R13: 00000000cd2af000 R14: 0000000000000000 R15: ffffc90000eabe68<br />
FS: 00007f94d76d5740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 0000000020000043 CR3: 0000000006880006 CR4: 0000000000770ee0<br />
PKRU: 55555554<br />
Call Trace:<br />
<br />
? write_comp_data+0x2f/0x90<br />
iommufd_fops_ioctl+0x1ef/0x310<br />
__x64_sys_ioctl+0x10e/0x160<br />
? __pfx_iommufd_fops_ioctl+0x10/0x10<br />
do_syscall_64+0x3b/0x90<br />
entry_SYSCALL_64_after_hwframe+0x72/0xdc<br />
<br />
Check that the user memory range doesn&#39;t overflow.