CVE-2023-53112

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53112
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53112.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53112
Downstream
Related
Published
2025-05-02T15:55:51Z
Modified
2025-10-14T09:23:16.385727Z
Summary
drm/i915/sseu: fix max_subslices array-index-out-of-bounds access
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/sseu: fix max_subslices array-index-out-of-bounds access

It seems that commit bc3c5e0809ae ("drm/i915/sseu: Don't try to store EU mask internally in UAPI format") exposed a potential out-of-bounds access, reported by UBSAN as following on a laptop with a gen 11 i915 card:

UBSAN: array-index-out-of-bounds in drivers/gpu/drm/i915/gt/intelsseu.c:65:27 index 6 is out of range for type 'u16 [6]' CPU: 2 PID: 165 Comm: systemd-udevd Not tainted 6.2.0-9-generic #9-Ubuntu Hardware name: Dell Inc. XPS 13 9300/077Y9N, BIOS 1.11.0 03/22/2022 Call Trace: <TASK> showstack+0x4e/0x61 dumpstacklvl+0x4a/0x6f dumpstack+0x10/0x18 ubsanepilogue+0x9/0x3a _ubsanhandleoutofbounds.cold+0x42/0x47 gen11computesseuinfo+0x121/0x130 [i915] intelsseuinfoinit+0x15d/0x2b0 [i915] intelgtinitmmio+0x23/0x40 [i915] i915drivermmioprobe+0x129/0x400 [i915] ? intelgtprobeall+0x91/0x2e0 [i915] i915driverprobe+0xe1/0x3f0 [i915] ? drmprivacyscreenget+0x16d/0x190 [drm] ? acpidevfound+0x64/0x80 i915pci_probe+0xac/0x1b0 [i915] ...

According to the definition of sseudevinfo, eumask->hsw is limited to a maximum of GENMAXSSPERHSWSLICE (6) sub-slices, but gen11sseuinfoinit() can potentially set 8 sub-slices, in the !ISJSL_EHL(gt->i915) case.

Fix this by reserving up to 8 slots for maxsubslices in the eumask struct.

(cherry picked from commit 3cba09a6ac86ea1d456909626eb2685596c07822)

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bc3c5e0809ae9faa039baf75547e8ee46ec124ef
Fixed
1a1682abf7399318ac074b1f2ac6a8c992b5b3da
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bc3c5e0809ae9faa039baf75547e8ee46ec124ef
Fixed
36b076ab6247cf0d2135b2ad6bb337617c3b5a1b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
bc3c5e0809ae9faa039baf75547e8ee46ec124ef
Fixed
193c41926d152761764894f46e23b53c00186a82

Affected versions

v5.*

v5.18
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2
v6.2.3
v6.2.4
v6.2.5
v6.2.6
v6.2.7
v6.3-rc1
v6.3-rc2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.1.21
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.8