Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: fix potential kgd_mem UAFs kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while p->mutex is held. As soon as the mutex is unlocked, another thread can free the BO.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-09 | Updated 2025-12-09 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5045360f3bb62ccd4f87202e33489f71f8bbc3fc
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5ca14fb5552ac13a2402d306c0bd2379a71610ff
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9da050b0d9e04439d225a2ec3044af70cdfb3933
affected

Default status
affected

6.1.23 (semver)
unaffected

6.2.10 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5045360f3bb62ccd4f87202e33489f71f8bbc3fc

git.kernel.org/...c/5ca14fb5552ac13a2402d306c0bd2379a71610ff

git.kernel.org/...c/9da050b0d9e04439d225a2ec3044af70cdfb3933

cve.org (CVE-2023-53816)

nvd.nist.gov (CVE-2023-53816)

Download JSON