{"id":"CVE-2023-53819","summary":"amdgpu: validate offset_in_bo of drm_amdgpu_gem_va","details":"In the Linux kernel, the following vulnerability has been resolved:\n\namdgpu: validate offset_in_bo of drm_amdgpu_gem_va\n\nThis is motivated by OOB access in amdgpu_vm_update_range when\noffset_in_bo+map_size overflows.\n\nv2: keep the validations in amdgpu_vm_bo_map\nv3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map\n    rather than to amdgpu_gem_va_ioctl","modified":"2026-03-31T17:29:34.311218Z","published":"2025-12-09T00:01:17.936Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53819.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4300a47e4017c9febb60ffa7d39723eeaed00f2b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82aace80cfaab778245bd2f9e31b67953725e4d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/968e27fd037ec4732068820a9b9836eccc0e0a12"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9f0bcf49e9895cb005d78b33a5eebfa11711b425"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b10db1d2137415e5e7f9706d96cfe77539c499d4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bc6dbf34dc4fb639522f3e8e66ef05997c0441ee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d83c337e654d58d3edd15a2ae76e87dc601c07d9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f015aadc0d973047f49526a127e900c488d4e425"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53819.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53819"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"9f7eb5367d0001536c361bd1400e14521f854ff1"},{"fixed":"82aace80cfaab778245bd2f9e31b67953725e4d0"},{"fixed":"d83c337e654d58d3edd15a2ae76e87dc601c07d9"},{"fixed":"968e27fd037ec4732068820a9b9836eccc0e0a12"},{"fixed":"4300a47e4017c9febb60ffa7d39723eeaed00f2b"},{"fixed":"b10db1d2137415e5e7f9706d96cfe77539c499d4"},{"fixed":"f015aadc0d973047f49526a127e900c488d4e425"},{"fixed":"bc6dbf34dc4fb639522f3e8e66ef05997c0441ee"},{"fixed":"9f0bcf49e9895cb005d78b33a5eebfa11711b425"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53819.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.2.0"},{"fixed":"4.19.313"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.275"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.188"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.39"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.4.0"},{"fixed":"6.4.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53819.json"}}],"schema_version":"1.7.5"}