Skip to main content

CVE-2023-53112: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-53112cvecve-2023-53112
Published: Fri May 02 2025 (05/02/2025, 15:55:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/i915/sseu: fix max_subslices array-index-out-of-bounds access It seems that commit bc3c5e0809ae ("drm/i915/sseu: Don't try to store EU mask internally in UAPI format") exposed a potential out-of-bounds access, reported by UBSAN as following on a laptop with a gen 11 i915 card: UBSAN: array-index-out-of-bounds in drivers/gpu/drm/i915/gt/intel_sseu.c:65:27 index 6 is out of range for type 'u16 [6]' CPU: 2 PID: 165 Comm: systemd-udevd Not tainted 6.2.0-9-generic #9-Ubuntu Hardware name: Dell Inc. XPS 13 9300/077Y9N, BIOS 1.11.0 03/22/2022 Call Trace: <TASK> show_stack+0x4e/0x61 dump_stack_lvl+0x4a/0x6f dump_stack+0x10/0x18 ubsan_epilogue+0x9/0x3a __ubsan_handle_out_of_bounds.cold+0x42/0x47 gen11_compute_sseu_info+0x121/0x130 [i915] intel_sseu_info_init+0x15d/0x2b0 [i915] intel_gt_init_mmio+0x23/0x40 [i915] i915_driver_mmio_probe+0x129/0x400 [i915] ? intel_gt_probe_all+0x91/0x2e0 [i915] i915_driver_probe+0xe1/0x3f0 [i915] ? drm_privacy_screen_get+0x16d/0x190 [drm] ? acpi_dev_found+0x64/0x80 i915_pci_probe+0xac/0x1b0 [i915] ... According to the definition of sseu_dev_info, eu_mask->hsw is limited to a maximum of GEN_MAX_SS_PER_HSW_SLICE (6) sub-slices, but gen11_sseu_info_init() can potentially set 8 sub-slices, in the !IS_JSL_EHL(gt->i915) case. Fix this by reserving up to 8 slots for max_subslices in the eu_mask struct. (cherry picked from commit 3cba09a6ac86ea1d456909626eb2685596c07822)

AI-Powered Analysis

AILast updated: 07/01/2025, 04:27:42 UTC

Technical Analysis

CVE-2023-53112 is a vulnerability identified in the Linux kernel's Intel i915 graphics driver, specifically within the drm/i915/sseu (Slice/Subslice/EU) subsystem. The issue arises from an array-index-out-of-bounds access in the max_subslices array within the eu_mask structure. The vulnerability was introduced following a commit (bc3c5e0809ae) that altered how the EU mask is stored internally, inadvertently allowing the gen11_sseu_info_init() function to set up to 8 sub-slices in certain hardware configurations, exceeding the originally defined maximum of 6 sub-slices (GEN_MAX_SS_PER_HSW_SLICE). This discrepancy leads to an out-of-bounds access when the code attempts to index beyond the allocated array size, which is detected by the Undefined Behavior Sanitizer (UBSAN) during runtime on affected hardware such as laptops with Gen 11 Intel i915 graphics cards. The root cause is a mismatch between the array size reserved for sub-slices and the actual number of sub-slices the driver attempts to handle. The fix involves increasing the reserved slots for max_subslices in the eu_mask struct to accommodate up to 8 sub-slices, preventing out-of-bounds memory access. While this vulnerability does not have known exploits in the wild, it represents a memory safety flaw that could potentially lead to system instability or denial of service if triggered. The vulnerability is specific to certain Intel GPU hardware configurations running Linux kernel versions that include the problematic commit and prior to the patch. No CVSS score has been assigned yet, and no evidence suggests privilege escalation or remote code execution directly from this flaw, but the out-of-bounds access could be leveraged in complex attack chains or cause kernel crashes.

Potential Impact

For European organizations, the impact of CVE-2023-53112 primarily concerns systems running Linux with Intel Gen 11 i915 graphics hardware, which is common in many enterprise laptops and desktops, including popular models like Dell XPS series. The vulnerability could lead to kernel crashes or system instability, potentially causing denial of service conditions. This can disrupt business operations, especially in environments relying on Linux-based workstations or servers with integrated Intel graphics. While the vulnerability does not directly enable code execution or privilege escalation, the instability could be exploited by local attackers or malicious software to degrade system reliability or facilitate further attacks. Organizations in sectors with high reliance on Linux workstations, such as software development, research institutions, and technology companies, may be more affected. Additionally, critical infrastructure or industrial control systems using affected hardware and Linux kernels could face operational risks. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted local attacks.

Mitigation Recommendations

To mitigate CVE-2023-53112, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the max_subslices array bounds issue. This patch increases the reserved array size to prevent out-of-bounds access. 2) Identify and inventory systems using Intel Gen 11 i915 graphics hardware and verify kernel versions to prioritize patch deployment. 3) For environments where immediate patching is challenging, consider temporarily disabling the i915 driver or using kernel boot parameters to limit GPU features, though this may reduce graphics performance. 4) Monitor system logs for UBSAN or kernel warnings related to i915 or drm subsystems that could indicate attempts to trigger the vulnerability. 5) Implement strict local user access controls to limit untrusted users from executing code or processes that could exploit kernel vulnerabilities. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. 7) Incorporate this vulnerability into vulnerability management and patching workflows to maintain ongoing security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-02T15:51:43.554Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe7034

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 4:27:42 AM

Last updated: 7/31/2025, 6:03:20 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats