Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53236

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
15/09/2025
Última modificación:
15/09/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iommufd: Do not corrupt the pfn list when doing batch carry<br /> <br /> If batch-&gt;end is 0 then setting npfns[0] before computing the new value of<br /> pfns will fail to adjust the pfn and result in various page accounting<br /> corruptions. It should be ordered after.<br /> <br /> This seems to result in various kinds of page meta-data corruption related<br /> failures:<br /> <br /> WARNING: CPU: 1 PID: 527 at mm/gup.c:75 try_grab_folio+0x503/0x740<br /> Modules linked in:<br /> CPU: 1 PID: 527 Comm: repro Not tainted 6.3.0-rc2-eeac8ede1755+ #1<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014<br /> RIP: 0010:try_grab_folio+0x503/0x740<br /> Code: e3 01 48 89 de e8 6d c1 dd ff 48 85 db 0f 84 7c fe ff ff e8 4f bf dd ff 49 8d 47 ff 48 89 45 d0 e9 73 fe ff ff e8 3d bf dd ff 0b 31 db e9 d0 fc ff ff e8 2f bf dd ff 48 8b 5d c8 31 ff 48 89<br /> RSP: 0018:ffffc90000f37908 EFLAGS: 00010046<br /> RAX: 0000000000000000 RBX: 00000000fffffc02 RCX: ffffffff81504c26<br /> RDX: 0000000000000000 RSI: ffff88800d030000 RDI: 0000000000000002<br /> RBP: ffffc90000f37948 R08: 000000000003ca24 R09: 0000000000000008<br /> R10: 000000000003ca00 R11: 0000000000000023 R12: ffffea000035d540<br /> R13: 0000000000000001 R14: 0000000000000000 R15: ffffea000035d540<br /> FS: 00007fecbf659740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00000000200011c3 CR3: 000000000ef66006 CR4: 0000000000770ee0<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> internal_get_user_pages_fast+0xd32/0x2200<br /> pin_user_pages_fast+0x65/0x90<br /> pfn_reader_user_pin+0x376/0x390<br /> pfn_reader_next+0x14a/0x7b0<br /> pfn_reader_first+0x140/0x1b0<br /> iopt_area_fill_domain+0x74/0x210<br /> iopt_table_add_domain+0x30e/0x6e0<br /> iommufd_device_selftest_attach+0x7f/0x140<br /> iommufd_test+0x10ff/0x16f0<br /> iommufd_fops_ioctl+0x206/0x330<br /> __x64_sys_ioctl+0x10e/0x160<br /> do_syscall_64+0x3b/0x90<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc

Impacto