DEBIAN-CVE-2023-54137

Source
https://security-tracker.debian.org/tracker/CVE-2023-54137
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54137.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-54137
Upstream
Published
2025-12-24T13:16:15.693Z
Modified
2026-03-11T07:36:31.034776Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: vfio/type1: fix capmigration information leak Fix an information leak where an uninitialized hole in struct vfioiommutype1infocapmigration on the stack is exposed to userspace. The definition of struct vfioiommutype1infocapmigration contains a hole as shown in this pahole(1) output: struct vfioiommutype1infocapmigration { struct vfioinfocapheader header; /* 0 8 / __u32 flags; / 8 4 / / XXX 4 bytes hole, try to pack / _u64 pgsizebitmap; / 16 8 / _u64 maxdirtybitmapsize; / 24 8 / / size: 32, cachelines: 1, members: 4 / / sum members: 28, holes: 1, sum holes: 4 / / last cacheline: 32 bytes */ }; The capmig variable is filled in without initializing the hole: static int vfioiommumigrationbuildcaps(struct vfioiommu *iommu, struct vfioinfocap caps) { struct vfioiommutype1infocapmigration capmig; capmig.header.id = VFIOIOMMUTYPE1INFOCAPMIGRATION; capmig.header.version = 1; capmig.flags = 0; / support minimum pgsize */ capmig.pgsizebitmap = (sizet)1 << _ffs(iommu->pgsizebitmap); capmig.maxdirtybitmapsize = DIRTYBITMAPSIZEMAX; return vfioinfoaddcapability(caps, &capmig.header, sizeof(capmig)); } The structure is then copied to a temporary location on the heap. At this point it's already too late and ioctl(VFIOIOMMUGETINFO) copies it to userspace later: int vfioinfoaddcapability(struct vfioinfocap *caps, struct vfioinfocapheader *cap, sizet size) { struct vfioinfocapheader *header; header = vfioinfocapadd(caps, size, cap->id, cap->version); if (ISERR(header)) return PTRERR(header); memcpy(header + 1, cap + 1, size - sizeof(*header)); return 0; } This issue was found by code inspection.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.197-1

Affected versions

5.*
5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1
5.10.178-1
5.10.178-2
5.10.178-3
5.10.179-1
5.10.179-2
5.10.179-3
5.10.179-4
5.10.179-5
5.10.191-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54137.json"

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.55-1

Affected versions

6.*
6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54137.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54137.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54137.json"