VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2023-53708

CVE-2023-53708

Description

In the Linux kernel, the following vulnerability has been resolved:

ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects

If a badly constructed firmware includes multiple ACPI_TYPE_PACKAGE objects while evaluating the AMD LPS0 _DSM, there will be a memory leak. Explicitly guard against this.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's ACPI s2idle code for AMD platforms occurs when firmware provides multiple ACPI_TYPE_PACKAGE objects during LPS0 _DSM evaluation.

Vulnerability

Overview

CVE-2023-53708 is a memory leak vulnerability in the Linux kernel's ACPI subsystem, specifically in the x86/s2idle path. The root cause is that the code handling the AMD LPS0 _DSM (Device Specific Method) evaluation does not properly guard against receiving multiple ACPI_TYPE_PACKAGE objects from a malformed or malicious firmware. When such multiple packages are encountered, the kernel fails to free the previously allocated memory, leading to a leak [1][2].

Exploitation

Context

Exploitation requires a system with an AMD platform that supports the Low Power S0 Idle (LPS0) firmware interface. The attack vector is local is local, as the firmware is part of the system's UEFI/BIOS. An attacker with the ability to influence or provide a crafted firmware table (e.g., through a firmware update or physical access) could trigger the condition. No special privileges are needed beyond the ability to boot the system, as the leak occurs during normal ACPI table parsing at boot or resume time.

Impact

An attacker exploiting this vulnerability can cause a kernel memory leak, which over repeated boot cycles or resume events may exhaust system memory, leading to denial of service (DoS). The leak does not directly allow code execution or privilege escalation, but it can degrade system stability and availability.

Mitigation

The fix was applied to the Linux kernel stable tree in commits [1] and [2]. Users should update to a kernel version containing these patches. No workaround is available other than applying the kernel update. The vulnerability is not known to be exploited in the wild.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.