CVE-2023-53819
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amdgpu | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's amdgpu driver involves an out-of-bounds (OOB) access issue caused by improper validation of the offset_in_bo parameter in the drm_amdgpu_gem_va function. Specifically, when offset_in_bo plus map_size overflows, it can lead to accessing memory outside the intended buffer. The fix involved adding proper validations in the amdgpu_vm_bo_map and amdgpu_vm_bo_replace_map functions to prevent this overflow and OOB access.
How can this vulnerability impact me? :
This vulnerability can lead to out-of-bounds memory access in the amdgpu driver, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges by exploiting the memory corruption.