CVE-2023-54137

Source
https://cve.org/CVERecord?id=CVE-2023-54137
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54137.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54137
Downstream
Related
Published
2025-12-24T13:06:52.689Z
Modified
2026-03-11T07:49:15.585394Z
Summary
vfio/type1: fix cap_migration information leak
Details

In the Linux kernel, the following vulnerability has been resolved:

vfio/type1: fix cap_migration information leak

Fix an information leak where an uninitialized hole in struct vfioiommutype1infocap_migration on the stack is exposed to userspace.

The definition of struct vfioiommutype1infocap_migration contains a hole as shown in this pahole(1) output:

struct vfioiommutype1infocapmigration { struct vfioinfocapheader header; /* 0 8 / __u32 flags; / 8 4 */

      /* XXX 4 bytes hole, try to pack */

      __u64                      pgsize_bitmap;        /*    16     8 */
      __u64                      max_dirty_bitmap_size; /*    24     8 */

      /* size: 32, cachelines: 1, members: 4 */
      /* sum members: 28, holes: 1, sum holes: 4 */
      /* last cacheline: 32 bytes */

};

The cap_mig variable is filled in without initializing the hole:

static int vfioiommumigrationbuildcaps(struct vfioiommu *iommu, struct vfioinfocap *caps) { struct vfioiommutype1infocapmigration cap_mig;

  cap_mig.header.id = VFIO_IOMMU_TYPE1_INFO_CAP_MIGRATION;
  cap_mig.header.version = 1;

  cap_mig.flags = 0;
  /* support minimum pgsize */
  cap_mig.pgsize_bitmap = (size_t)1 << __ffs(iommu->pgsize_bitmap);
  cap_mig.max_dirty_bitmap_size = DIRTY_BITMAP_SIZE_MAX;

  return vfio_info_add_capability(caps, &cap_mig.header, sizeof(cap_mig));

}

The structure is then copied to a temporary location on the heap. At this point it's already too late and ioctl(VFIOIOMMUGET_INFO) copies it to userspace later:

int vfioinfoaddcapability(struct vfioinfocap *caps, struct vfioinfocapheader *cap, sizet size) { struct vfioinfocapheader *header;

  header = vfio_info_cap_add(caps, size, cap->id, cap->version);
  if (IS_ERR(header))
      return PTR_ERR(header);

  memcpy(header + 1, cap + 1, size - sizeof(*header));

  return 0;

}

This issue was found by code inspection.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54137.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ad721705d09c62f0d108a6b4f59867ebfd592c90
Fixed
ad83d83dd891244de0d07678b257dc976db7c132
Fixed
13fd667db999bffb557c5de7adb3c14f1713dd51
Fixed
f6f300ecc196d243c02adeb9ee0c62c677c24bfb
Fixed
cbac29a1caa49a34e131394e1f4d924a76d8b0c9
Fixed
1b5feb8497cdb5b9962db2700814bffbc030fb4a
Fixed
cd24e2a60af633f157d7e59c0a6dba64f131c0b1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54137.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.195
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.132
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.53
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.16
Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.5.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54137.json"