Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-54239

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iommufd: Check for uptr overflow<br /> <br /> syzkaller found that setting up a map with a user VA that wraps past zero<br /> can trigger WARN_ONs, particularly from pin_user_pages weirdly returning 0<br /> due to invalid arguments.<br /> <br /> Prevent creating a pages with a uptr and size that would math overflow.<br /> <br /> WARNING: CPU: 0 PID: 518 at drivers/iommu/iommufd/pages.c:793 pfn_reader_user_pin+0x2e6/0x390<br /> Modules linked in:<br /> CPU: 0 PID: 518 Comm: repro Not tainted 6.3.0-rc2-eeac8ede1755+ #1<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014<br /> RIP: 0010:pfn_reader_user_pin+0x2e6/0x390<br /> Code: b1 11 e9 25 fe ff ff e8 28 e4 0f ff 31 ff 48 89 de e8 2e e6 0f ff 48 85 db 74 0a e8 14 e4 0f ff e9 4d ff ff ff e8 0a e4 0f ff 0b bb f2 ff ff ff e9 3c ff ff ff e8 f9 e3 0f ff ba 01 00 00 00<br /> RSP: 0018:ffffc90000f9fa30 EFLAGS: 00010246<br /> RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff821e2b72<br /> RDX: 0000000000000000 RSI: ffff888014184680 RDI: 0000000000000002<br /> RBP: ffffc90000f9fa78 R08: 00000000000000ff R09: 0000000079de6f4e<br /> R10: ffffc90000f9f790 R11: ffff888014185418 R12: ffffc90000f9fc60<br /> R13: 0000000000000002 R14: ffff888007879800 R15: 0000000000000000<br /> FS: 00007f4227555740(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000000020000043 CR3: 000000000e748005 CR4: 0000000000770ef0<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> pfn_reader_next+0x14a/0x7b0<br /> ? interval_tree_double_span_iter_update+0x11a/0x140<br /> pfn_reader_first+0x140/0x1b0<br /> iopt_pages_rw_slow+0x71/0x280<br /> ? __this_cpu_preempt_check+0x20/0x30<br /> iopt_pages_rw_access+0x2b2/0x5b0<br /> iommufd_access_rw+0x19f/0x2f0<br /> iommufd_test+0xd11/0x16f0<br /> ? write_comp_data+0x2f/0x90<br /> iommufd_fops_ioctl+0x206/0x330<br /> __x64_sys_ioctl+0x10e/0x160<br /> ? __pfx_iommufd_fops_ioctl+0x10/0x10<br /> do_syscall_64+0x3b/0x90<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc

Impacto