CVE-2023-53816Race Condition in Linux

CWE-362Race Condition6 documents5 sources
Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while p->mutex is held. As soon as the mutex is unlocked, another thread can free the BO.

Affected Packages4 packages

Linuxlinux/linux_kernel3.19.06.1.23+1
Debianlinux/linux_kernel< 6.1.25-1+2
CVEListV5linux/linux4a488a7ad71401169cecee75dc94bcce642e2c535045360f3bb62ccd4f87202e33489f71f8bbc3fc+3
debiandebian/linux< linux 6.1.25-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-rqmv-mc92-m7mr: In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_2025-12-09
OSV
CVE-2023-53816: In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_de2025-12-09
OSV
drm/amdkfd: fix potential kgd_mem UAFs2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: drm/amdkfd: fix potential kgd_mem UAFs2025-12-09
Debian
CVE-2023-53816: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd:...2023