CVE-2023-53395

Source
https://cve.org/CVERecord?id=CVE-2023-53395
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53395.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53395
Downstream
Related
Published
2025-09-18T13:33:36.624Z
Modified
2026-03-20T12:33:08.137481Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Add AMLNOOPERAND_RESOLVE flag to Timer

ACPICA commit 90310989a0790032f5a0140741ff09b545af4bc5

According to the ACPI specification 19.6.134, no argument is required to be passed for ASL Timer instruction. For taking care of no argument, AMLNOOPERAND_RESOLVE flag is added to ASL Timer instruction opcode.

When ASL timer instruction interpreted by ACPI interpreter, getting error. After adding AMLNOOPERAND_RESOLVE flag to ASL Timer instruction opcode, issue is not observed.

============================================================= UBSAN: array-index-out-of-bounds in acpica/dswexec.c:401:12 index -1 is out of range for type 'union acpioperandobject *[9]' CPU: 37 PID: 1678 Comm: cat Not tainted 6.0.0-dev-th500-6.0.y-1+bcf8c46459e407-generic-64k HW name: NVIDIA BIOS v1.1.1-d7acbfc-dirty 12/19/2022 Call trace: dumpbacktrace+0xe0/0x130 showstack+0x20/0x60 dumpstacklvl+0x68/0x84 dumpstack+0x18/0x34 ubsanepilogue+0x10/0x50 __ubsanhandleoutofbounds+0x80/0x90 acpidsexecendop+0x1bc/0x6d8 acpipsparseloop+0x57c/0x618 acpipsparseaml+0x1e0/0x4b4 acpipsexecutemethod+0x24c/0x2b8 acpinsevaluate+0x3a8/0x4bc acpievaluateobject+0x15c/0x37c acpievaluateinteger+0x54/0x15c showpower+0x8c/0x12c [acpipowermeter]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53395.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
2f2a5905303ae230b5159fcd8cdcd5b3e7ad5e2d
Fixed
23c67fa615c52712bfa02a6dfadbd4656c87c066
Fixed
3bf4463e40a17a23f2f261dfd7fe23129bdd04a4
Fixed
625c12dc04a607b79f180ef3ee5a12bf2e3324c0
Fixed
430787056dd3c591eb553d5c3b2717efcf307d4e
Fixed
e1f686930ee4b059c7baa3c3904b2401829f2589
Fixed
b102113469487b460e9e77fe9e00d49c50fe8c86
Fixed
3a21ffdbc825e0919db9da0e27ee5ff2cc8a863e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53395.json"