VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54057

CVE-2023-54057

Description

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter

The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow, because the string specifier in the format string sscanf() has no width limitation.

Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A buffer overflow in the Linux kernel's AMD IOMMU driver due to missing width limit in sscanf() for the ivrs_acpihid parameter.

Vulnerability

Overview

In the Linux kernel, the AMD IOMMU driver's parse_ivrs_acpihid function contains a buffer overflow vulnerability in the handling of the ivrs_acpihid command-line parameter. The acpiid buffer can overflow because the sscanf() format string used to parse the parameter lacks a width limitation on the string specifier [1][2].

Exploitation

This vulnerability is triggered during kernel boot when the system parses the ivrs_acpihid command-line parameter. An attacker with the ability to control or influence kernel command-line arguments (e.g., via a compromised bootloader or through certain hypervisor configurations) could supply an overly long string for the ACPI HID component, causing a buffer overflow in the kernel stack.

Impact

A successful overflow could corrupt kernel memory, potentially leading to a denial of service (system crash) or, in more severe scenarios, arbitrary code execution at the kernel level. The vulnerability was discovered by InfoTeCS on behalf of the Linux Verification Center using the SVACE static analysis tool [1][2].

Mitigation

The fix has been applied to the Linux kernel stable tree. Users should update to a kernel version containing the commit that adds a length limitation to the sscanf() format string for the ivrs_acpihid parameter [1][2]. No workaround is available other than applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.