CVE-2023-53112: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/i915/sseu: fix max_subslices array-index-out-of-bounds access It seems that commit bc3c5e0809ae ("drm/i915/sseu: Don't try to store EU mask internally in UAPI format") exposed a potential out-of-bounds access, reported by UBSAN as following on a laptop with a gen 11 i915 card: UBSAN: array-index-out-of-bounds in drivers/gpu/drm/i915/gt/intel_sseu.c:65:27 index 6 is out of range for type 'u16 [6]' CPU: 2 PID: 165 Comm: systemd-udevd Not tainted 6.2.0-9-generic #9-Ubuntu Hardware name: Dell Inc. XPS 13 9300/077Y9N, BIOS 1.11.0 03/22/2022 Call Trace: <TASK> show_stack+0x4e/0x61 dump_stack_lvl+0x4a/0x6f dump_stack+0x10/0x18 ubsan_epilogue+0x9/0x3a __ubsan_handle_out_of_bounds.cold+0x42/0x47 gen11_compute_sseu_info+0x121/0x130 [i915] intel_sseu_info_init+0x15d/0x2b0 [i915] intel_gt_init_mmio+0x23/0x40 [i915] i915_driver_mmio_probe+0x129/0x400 [i915] ? intel_gt_probe_all+0x91/0x2e0 [i915] i915_driver_probe+0xe1/0x3f0 [i915] ? drm_privacy_screen_get+0x16d/0x190 [drm] ? acpi_dev_found+0x64/0x80 i915_pci_probe+0xac/0x1b0 [i915] ... According to the definition of sseu_dev_info, eu_mask->hsw is limited to a maximum of GEN_MAX_SS_PER_HSW_SLICE (6) sub-slices, but gen11_sseu_info_init() can potentially set 8 sub-slices, in the !IS_JSL_EHL(gt->i915) case. Fix this by reserving up to 8 slots for max_subslices in the eu_mask struct. (cherry picked from commit 3cba09a6ac86ea1d456909626eb2685596c07822)
AI Analysis
Technical Summary
CVE-2023-53112 is a vulnerability identified in the Linux kernel's Intel i915 graphics driver, specifically within the drm/i915/sseu (Slice/Subslice/EU) subsystem. The issue arises from an array-index-out-of-bounds access in the max_subslices array within the eu_mask structure. The vulnerability was introduced following a commit (bc3c5e0809ae) that altered how the EU mask is stored internally, inadvertently allowing the gen11_sseu_info_init() function to set up to 8 sub-slices in certain hardware configurations, exceeding the originally defined maximum of 6 sub-slices (GEN_MAX_SS_PER_HSW_SLICE). This discrepancy leads to an out-of-bounds access when the code attempts to index beyond the allocated array size, which is detected by the Undefined Behavior Sanitizer (UBSAN) during runtime on affected hardware such as laptops with Gen 11 Intel i915 graphics cards. The root cause is a mismatch between the array size reserved for sub-slices and the actual number of sub-slices the driver attempts to handle. The fix involves increasing the reserved slots for max_subslices in the eu_mask struct to accommodate up to 8 sub-slices, preventing out-of-bounds memory access. While this vulnerability does not have known exploits in the wild, it represents a memory safety flaw that could potentially lead to system instability or denial of service if triggered. The vulnerability is specific to certain Intel GPU hardware configurations running Linux kernel versions that include the problematic commit and prior to the patch. No CVSS score has been assigned yet, and no evidence suggests privilege escalation or remote code execution directly from this flaw, but the out-of-bounds access could be leveraged in complex attack chains or cause kernel crashes.
Potential Impact
For European organizations, the impact of CVE-2023-53112 primarily concerns systems running Linux with Intel Gen 11 i915 graphics hardware, which is common in many enterprise laptops and desktops, including popular models like Dell XPS series. The vulnerability could lead to kernel crashes or system instability, potentially causing denial of service conditions. This can disrupt business operations, especially in environments relying on Linux-based workstations or servers with integrated Intel graphics. While the vulnerability does not directly enable code execution or privilege escalation, the instability could be exploited by local attackers or malicious software to degrade system reliability or facilitate further attacks. Organizations in sectors with high reliance on Linux workstations, such as software development, research institutions, and technology companies, may be more affected. Additionally, critical infrastructure or industrial control systems using affected hardware and Linux kernels could face operational risks. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted local attacks.
Mitigation Recommendations
To mitigate CVE-2023-53112, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the max_subslices array bounds issue. This patch increases the reserved array size to prevent out-of-bounds access. 2) Identify and inventory systems using Intel Gen 11 i915 graphics hardware and verify kernel versions to prioritize patch deployment. 3) For environments where immediate patching is challenging, consider temporarily disabling the i915 driver or using kernel boot parameters to limit GPU features, though this may reduce graphics performance. 4) Monitor system logs for UBSAN or kernel warnings related to i915 or drm subsystems that could indicate attempts to trigger the vulnerability. 5) Implement strict local user access controls to limit untrusted users from executing code or processes that could exploit kernel vulnerabilities. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. 7) Incorporate this vulnerability into vulnerability management and patching workflows to maintain ongoing security posture.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2023-53112: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/i915/sseu: fix max_subslices array-index-out-of-bounds access It seems that commit bc3c5e0809ae ("drm/i915/sseu: Don't try to store EU mask internally in UAPI format") exposed a potential out-of-bounds access, reported by UBSAN as following on a laptop with a gen 11 i915 card: UBSAN: array-index-out-of-bounds in drivers/gpu/drm/i915/gt/intel_sseu.c:65:27 index 6 is out of range for type 'u16 [6]' CPU: 2 PID: 165 Comm: systemd-udevd Not tainted 6.2.0-9-generic #9-Ubuntu Hardware name: Dell Inc. XPS 13 9300/077Y9N, BIOS 1.11.0 03/22/2022 Call Trace: <TASK> show_stack+0x4e/0x61 dump_stack_lvl+0x4a/0x6f dump_stack+0x10/0x18 ubsan_epilogue+0x9/0x3a __ubsan_handle_out_of_bounds.cold+0x42/0x47 gen11_compute_sseu_info+0x121/0x130 [i915] intel_sseu_info_init+0x15d/0x2b0 [i915] intel_gt_init_mmio+0x23/0x40 [i915] i915_driver_mmio_probe+0x129/0x400 [i915] ? intel_gt_probe_all+0x91/0x2e0 [i915] i915_driver_probe+0xe1/0x3f0 [i915] ? drm_privacy_screen_get+0x16d/0x190 [drm] ? acpi_dev_found+0x64/0x80 i915_pci_probe+0xac/0x1b0 [i915] ... According to the definition of sseu_dev_info, eu_mask->hsw is limited to a maximum of GEN_MAX_SS_PER_HSW_SLICE (6) sub-slices, but gen11_sseu_info_init() can potentially set 8 sub-slices, in the !IS_JSL_EHL(gt->i915) case. Fix this by reserving up to 8 slots for max_subslices in the eu_mask struct. (cherry picked from commit 3cba09a6ac86ea1d456909626eb2685596c07822)
AI-Powered Analysis
Technical Analysis
CVE-2023-53112 is a vulnerability identified in the Linux kernel's Intel i915 graphics driver, specifically within the drm/i915/sseu (Slice/Subslice/EU) subsystem. The issue arises from an array-index-out-of-bounds access in the max_subslices array within the eu_mask structure. The vulnerability was introduced following a commit (bc3c5e0809ae) that altered how the EU mask is stored internally, inadvertently allowing the gen11_sseu_info_init() function to set up to 8 sub-slices in certain hardware configurations, exceeding the originally defined maximum of 6 sub-slices (GEN_MAX_SS_PER_HSW_SLICE). This discrepancy leads to an out-of-bounds access when the code attempts to index beyond the allocated array size, which is detected by the Undefined Behavior Sanitizer (UBSAN) during runtime on affected hardware such as laptops with Gen 11 Intel i915 graphics cards. The root cause is a mismatch between the array size reserved for sub-slices and the actual number of sub-slices the driver attempts to handle. The fix involves increasing the reserved slots for max_subslices in the eu_mask struct to accommodate up to 8 sub-slices, preventing out-of-bounds memory access. While this vulnerability does not have known exploits in the wild, it represents a memory safety flaw that could potentially lead to system instability or denial of service if triggered. The vulnerability is specific to certain Intel GPU hardware configurations running Linux kernel versions that include the problematic commit and prior to the patch. No CVSS score has been assigned yet, and no evidence suggests privilege escalation or remote code execution directly from this flaw, but the out-of-bounds access could be leveraged in complex attack chains or cause kernel crashes.
Potential Impact
For European organizations, the impact of CVE-2023-53112 primarily concerns systems running Linux with Intel Gen 11 i915 graphics hardware, which is common in many enterprise laptops and desktops, including popular models like Dell XPS series. The vulnerability could lead to kernel crashes or system instability, potentially causing denial of service conditions. This can disrupt business operations, especially in environments relying on Linux-based workstations or servers with integrated Intel graphics. While the vulnerability does not directly enable code execution or privilege escalation, the instability could be exploited by local attackers or malicious software to degrade system reliability or facilitate further attacks. Organizations in sectors with high reliance on Linux workstations, such as software development, research institutions, and technology companies, may be more affected. Additionally, critical infrastructure or industrial control systems using affected hardware and Linux kernels could face operational risks. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental crashes or targeted local attacks.
Mitigation Recommendations
To mitigate CVE-2023-53112, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the max_subslices array bounds issue. This patch increases the reserved array size to prevent out-of-bounds access. 2) Identify and inventory systems using Intel Gen 11 i915 graphics hardware and verify kernel versions to prioritize patch deployment. 3) For environments where immediate patching is challenging, consider temporarily disabling the i915 driver or using kernel boot parameters to limit GPU features, though this may reduce graphics performance. 4) Monitor system logs for UBSAN or kernel warnings related to i915 or drm subsystems that could indicate attempts to trigger the vulnerability. 5) Implement strict local user access controls to limit untrusted users from executing code or processes that could exploit kernel vulnerabilities. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and guidance. 7) Incorporate this vulnerability into vulnerability management and patching workflows to maintain ongoing security posture.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-05-02T15:51:43.554Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9830c4522896dcbe7034
Added to database: 5/21/2025, 9:09:04 AM
Last enriched: 7/1/2025, 4:27:42 AM
Last updated: 7/31/2025, 6:03:20 AM
Views: 12
Related Threats
CVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumCVE-2025-8685: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emilien Wp chart generator
MediumCVE-2025-8621: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in odn Mosaic Generator
MediumCVE-2025-8568: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prabode GMap Generator
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.