CVE-2023-54150
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amd: Fix an out of bounds error in BIOS parser
The array is hardcoded to 8 in atomfirmware.h, but firmware provides a bigger one sometimes. Deferencing the larger array causes an out of bounds error.
commit 4fc1ba4aa589 ("drm/amd/display: fix array index out of bound error in bios parser") fixed some of this, but there are two other cases not covered by it. Fix those as well.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An out-of-bounds error in the Linux kernel's AMD BIOS parser can occur when firmware provides an array larger than the hardcoded size of 8, potentially leading to memory corruption or information disclosure.
The vulnerability is an out-of-bounds access in the Linux kernel's AMD graphics BIOS parser. The structure in atomfirmware.h defines an array hardcoded to eight elements, but firmware tables can supply larger arrays, causing the parser to read beyond the allocated buffer [1][2]. This issue was partially addressed by commit 4fc1ba4aa589, but two additional cases remained unfixed.
Exploitation requires a system with AMD graphics hardware and the malicious firmware data to be parsed. The attack surface may involve a local attacker with the ability to replace or modify firmware data, or a remote attacker if firmware loading occurs over a network. However, typical exploitation would require either physical access or a compromised boot chain to inject a crafted firmware table.
An out-of-bounds read could lead to information disclosure or memory corruption, potentially resulting in denial of service or privilege escalation. The exact impact depends on the kernel memory layout and the surrounding data.
The fix is included in the Linux kernel stable releases. Users are advised to apply kernel updates to mitigate the vulnerability. No workarounds are documented.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5b8e7589f50b766acfe798cd05675ecd2e0b0dea2dbec716cd116db180decVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/5675ecd2e0b00a4318ba1db1a1234e7d45b13d6bnvd
- git.kernel.org/stable/c/66acfe798cd08b36cfbb65a30fab3159811304a7nvd
- git.kernel.org/stable/c/b8e7589f50b709b647b642531599e70707faf70cnvd
- git.kernel.org/stable/c/d116db180decec1b21bba31d2ff495ac4d8e1b83nvd
- git.kernel.org/stable/c/dea2dbec716c38a0b73b6ad01d91e2b120cc5f1envd
News mentions
0No linked articles in our index yet.