CVE-2023-54057
Description
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter
The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow, because the string specifier in the format string sscanf() has no width limitation.
Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A buffer overflow in the Linux kernel's AMD IOMMU driver due to missing width limit in sscanf() for the ivrs_acpihid parameter.
Vulnerability
Overview
In the Linux kernel, the AMD IOMMU driver's parse_ivrs_acpihid function contains a buffer overflow vulnerability in the handling of the ivrs_acpihid command-line parameter. The acpiid buffer can overflow because the sscanf() format string used to parse the parameter lacks a width limitation on the string specifier [1][2].
Exploitation
This vulnerability is triggered during kernel boot when the system parses the ivrs_acpihid command-line parameter. An attacker with the ability to control or influence kernel command-line arguments (e.g., via a compromised bootloader or through certain hypervisor configurations) could supply an overly long string for the ACPI HID component, causing a buffer overflow in the kernel stack.
Impact
A successful overflow could corrupt kernel memory, potentially leading to a denial of service (system crash) or, in more severe scenarios, arbitrary code execution at the kernel level. The vulnerability was discovered by InfoTeCS on behalf of the Linux Verification Center using the SVACE static analysis tool [1][2].
Mitigation
The fix has been applied to the Linux kernel stable tree. Users should update to a kernel version containing the commit that adds a length limitation to the sscanf() format string for the ivrs_acpihid parameter [1][2]. No workaround is available other than applying the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
65e97dc748d13f2a5ec7f7b28c513043e0afe2ae19ac3ea8263cd11165e5eb6b26d86c61cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/2ae19ac3ea82a5b87a81c10adbb497c9e58bdd60nvd
- git.kernel.org/stable/c/5e97dc748d13fad582136ba0c8cec215c7aeeb17nvd
- git.kernel.org/stable/c/63cd11165e5e0ea2012254c764003eda1f9adb7dnvd
- git.kernel.org/stable/c/b6b26d86c61c441144c72f842f7469bb686e1211nvd
- git.kernel.org/stable/c/c513043e0afe6a8ba79d00af358655afabb576d2nvd
- git.kernel.org/stable/c/f2a5ec7f7b28f9b9cd5fac232ff51019a7f7b9e9nvd
News mentions
0No linked articles in our index yet.