CVE-2023-54137 Affecting ocfs2-kmp-default package, versions <6.4.0-150600.23.84.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES156-OCFS2KMPDEFAULT-15106955
  • published27 Jan 2026
  • disclosed26 Jan 2026

Introduced: 26 Jan 2026

CVE-2023-54137  (opens in a new tab)

How to fix?

Upgrade SLES:15.6 ocfs2-kmp-default to version 6.4.0-150600.23.84.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ocfs2-kmp-default package and not the ocfs2-kmp-default package as distributed by SLES. See How to fix? for SLES:15.6 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

vfio/type1: fix cap_migration information leak

Fix an information leak where an uninitialized hole in struct vfio_iommu_type1_info_cap_migration on the stack is exposed to userspace.

The definition of struct vfio_iommu_type1_info_cap_migration contains a hole as shown in this pahole(1) output:

struct vfio_iommu_type1_info_cap_migration { struct vfio_info_cap_header header; /* 0 8 / __u32 flags; / 8 4 */

      /* XXX 4 bytes hole, try to pack */

  __u64                      pgsize_bitmap;        /*    16     8 */
  __u64                      max_dirty_bitmap_size; /*    24     8 */

  /* size: 32, cachelines: 1, members: 4 */
  /* sum members: 28, holes: 1, sum holes: 4 */
  /* last cacheline: 32 bytes */

};

The cap_mig variable is filled in without initializing the hole:

static int vfio_iommu_migration_build_caps(struct vfio_iommu *iommu, struct vfio_info_cap *caps) { struct vfio_iommu_type1_info_cap_migration cap_mig;

  cap_mig.header.id = VFIO_IOMMU_TYPE1_INFO_CAP_MIGRATION;
  cap_mig.header.version = 1;

cap_mig.flags = 0; /* support minimum pgsize */ cap_mig.pgsize_bitmap = (size_t)1 &lt;&lt; __ffs(iommu-&gt;pgsize_bitmap); cap_mig.max_dirty_bitmap_size = DIRTY_BITMAP_SIZE_MAX;

return vfio_info_add_capability(caps, &amp;cap_mig.header, sizeof(cap_mig));

}

The structure is then copied to a temporary location on the heap. At this point it's already too late and ioctl(VFIO_IOMMU_GET_INFO) copies it to userspace later:

int vfio_info_add_capability(struct vfio_info_cap *caps, struct vfio_info_cap_header *cap, size_t size) { struct vfio_info_cap_header *header;

  header = vfio_info_cap_add(caps, size, cap-&gt;id, cap-&gt;version);
  if (IS_ERR(header))
      return PTR_ERR(header);

memcpy(header + 1, cap + 1, size - sizeof(*header));

return 0;

}

This issue was found by code inspection.

CVSS Base Scores

version 3.1