First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix a race condition of vram buffer unref in svm code prange->svm_bo unref can happen in both mmu callback and a callback after migrate to system ram. Both are async call in different tasks. Sync svm_bo unref operation to avoid random "use-after-free".
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <5.15.140 | |
Linux Kernel | >=5.16<6.1.64 | |
Linux Kernel | >=6.2<6.5.13 | |
Linux Kernel | >=6.6<6.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52825 is classified as a moderate severity vulnerability due to its impact on the Linux kernel's vram buffer management.
To mitigate the effects of CVE-2023-52825, you should upgrade to the latest patched version of the Linux kernel as per the vendor's recommendations.
CVE-2023-52825 affects various versions of the Linux kernel, specifically those before 5.15.140 and between 5.16 and 6.1.64, 6.2 and 6.5.13, as well as 6.6 and 6.6.3.
CVE-2023-52825 specifically involves the drm and amdkfd components related to the Linux kernel's memory management.
There are currently no known workarounds for CVE-2023-52825, and it is recommended to update the Linux kernel to the fixed version.