VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2023-53753

CVE-2023-53753

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix mapping to non-allocated address

[Why] There is an issue mapping non-allocated location of memory. It would allocate gpio registers from an array out of bounds.

[How] Patch correct numbers of bounds for using.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel AMD GPU display driver maps GPIO registers from an array using an incorrect upper bound, causing out-of-bounds access on non-allocated memory.

Root

Cause

The vulnerability resides in the AMD display driver (drm/amd/display) within the Linux kernel. The GPIO register mapping logic uses an incorrect bounds check when indexing into a register array. This flaw allows the driver to map addresses beyond the allocated memory region, leading to out-of-bounds memory access [1][2].

Exploitation

Prerequisites

An attacker would need local access to a system with an affected AMD GPU and the ability to trigger the GPIO mapping code path. No special privileges beyond normal user access are required for this bug to be exercised; however, successful exploitation may depend on specific hardware configurations and kernel build options.

Impact

An out-of-bounds write or read could corrupt kernel memory, potentially leading to system instability, information disclosure, or privilege escalation. The exact impact depends on the surrounding memory layout and the specific operations performed on the mapped registers [1][2].

Mitigation

The fix was applied in the Linux kernel stable revisions. Users should update to a kernel version containing the commit that corrects the bounds check [1][2]. No workaround is available for unfixed kernels; a full kernel update is required.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.