VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54150

CVE-2023-54150

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix an out of bounds error in BIOS parser

The array is hardcoded to 8 in atomfirmware.h, but firmware provides a bigger one sometimes. Deferencing the larger array causes an out of bounds error.

commit 4fc1ba4aa589 ("drm/amd/display: fix array index out of bound error in bios parser") fixed some of this, but there are two other cases not covered by it. Fix those as well.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An out-of-bounds error in the Linux kernel's AMD BIOS parser can occur when firmware provides an array larger than the hardcoded size of 8, potentially leading to memory corruption or information disclosure.

The vulnerability is an out-of-bounds access in the Linux kernel's AMD graphics BIOS parser. The structure in atomfirmware.h defines an array hardcoded to eight elements, but firmware tables can supply larger arrays, causing the parser to read beyond the allocated buffer [1][2]. This issue was partially addressed by commit 4fc1ba4aa589, but two additional cases remained unfixed.

Exploitation requires a system with AMD graphics hardware and the malicious firmware data to be parsed. The attack surface may involve a local attacker with the ability to replace or modify firmware data, or a remote attacker if firmware loading occurs over a network. However, typical exploitation would require either physical access or a compromised boot chain to inject a crafted firmware table.

An out-of-bounds read could lead to information disclosure or memory corruption, potentially resulting in denial of service or privilege escalation. The exact impact depends on the kernel memory layout and the surrounding data.

The fix is included in the Linux kernel stable releases. Users are advised to apply kernel updates to mitigate the vulnerability. No workarounds are documented.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.