CVE-2023-54116
Out-of-Bounds Write in Linux drm/fbdev-generic Causes Kernel Hang
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's drm/fbdev-generic component involves a potential out-of-bounds memory access. Specifically, the fbdev test of IGT may write beyond the end of a buffer (after EOF), causing out-of-bound access in drm drivers using fbdev-generic. This happens because the damage rectangles computed by drm_fb_helper_memory_range_to_clip() are not guaranteed to be within the screen's active display area due to page size alignment and rounding errors. When copying framebuffer data line by line, the last line copy can exceed the allocated buffer size, potentially causing the kernel to hang or crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to hang or crash due to out-of-bounds memory access when running certain framebuffer tests or operations. This may lead to system instability or denial of service on affected systems using drm drivers with fbdev-generic, especially on platforms like x86+ast2400 with specific resolutions.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by prohibiting potential out-of-bounds access in the drm/fbdev-generic driver. Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this issue, which addresses the out-of-bound access caused by the fbdev test of IGT. There are no specific workaround commands provided.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the fbdev test of IGT (Intel Graphics Test) on a vulnerable system, especially on platforms like x86+ast2400 with specific resolutions (e.g., 1680x1050). The test may cause the Linux kernel to hang and produce a call trace indicating out-of-bounds access. To detect it, you can run the fbdev test from the IGT test suite using the command: `igt_fbdev --run=fbdev` or specifically the subtest that triggers the issue. Monitoring kernel logs (e.g., using `dmesg`) for Oops messages or call traces related to drm_fb_helper_damage_work or memcpy_erms can also help identify the problem.