CVE-2023-53778
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves integer overflow checking in the Linux kernel's accel/qaic component, specifically in the map_user_pages() function. The encode_dma() function previously performed checks on the size and address of a data transfer, but these checks were improved and moved to find_and_map_user_pages() for clarity and safety. The issue was that the original checks could miss certain overflow conditions when calculating the total transfer size, especially when transfers occur in parts. The patch introduces a 'remaining' variable to track how many bytes are left to transfer and adds safer checks to prevent integer overflow and invalid size calculations, particularly addressing concerns on 32-bit systems where size truncation could occur. This prevents potential errors or unexpected behavior during DMA operations.
How can this vulnerability impact me? :
If exploited or triggered, this vulnerability could cause incorrect handling of memory transfers in the Linux kernel's accel/qaic driver, potentially leading to invalid memory accesses or data corruption due to integer overflow errors. This could affect system stability or security by allowing improper DMA operations, which might be leveraged by attackers or cause system crashes.