VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54034

CVE-2023-54034

Description

In the Linux kernel, the following vulnerability has been resolved:

iommufd: Make sure to zero vfio_iommu_type1_info before copying to user

Missed a zero initialization here. Most of the struct is filled with a copy_from_user(), however minsz for that copy is smaller than the actual struct by 8 bytes, thus we don't fill the padding.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing zero-initialization in Linux kernel's iommufd leaks 8 bytes of kernel stack padding to userspace via vfio_iommu_type1_info.

Vulnerability

In the Linux kernel's iommufd subsystem, the function handling vfio_iommu_iommu_type1_info (likely vfio_iommu_type1_info) fails to zero-initialize the entire structure before copying it to userspace. The structure is partially filled via copy_from_user(), but the minimum size (minsz`) used for that copy is 8 bytes smaller than the actual struct size. This leaves the padding bytes uninitialized, potentially leaking kernel stack memory [1].

Exploitation

An attacker with access to the iommufd (i.e., able to open /dev/iommu and issue the relevant IOCTL) can trigger this info leak. No special privileges beyond user-level access to the iommufd device are required. The attack surface is local, as the device is only accessible from within the system [1].

Impact

By reading the leaked 8 bytes of kernel stack data, an attacker may obtain sensitive information such as kernel pointers or other data that could aid in bypassing KASLR or crafting further exploits. The leak is limited to 8 bytes per call, but repeated calls could accumulate more data [1].

Mitigation

The fix was committed to the Linux kernel stable tree in commit b3551ead6163, which adds a memset() to zero the entire structure before use. Users should apply the latest stable kernel updates to remediate this issue [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.