CVE-2023-53327
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-10
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.2 (inc) to 6.2.15 (exc) |
| linux | linux_kernel | From 6.3 (inc) to 6.3.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves an overflow issue in the iommufd selftest code, specifically related to handling user pointer (uptr) and length values. When a user pointer value is close to the maximum uintptr_t value (UINTPTR_MAX), it can cause an overflow in the memory range calculation, triggering a kernel warning (WARN_ON). The fix ensures that the user memory range is properly checked to prevent this overflow.
How can this vulnerability impact me? :
If exploited, this vulnerability could cause the Linux kernel to hit a warning or potentially crash due to improper handling of memory ranges, which might lead to denial of service or instability in systems using the affected kernel version. It affects the kernel's ability to safely handle certain user memory ranges, potentially impacting system reliability.