First published: Thu Mar 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Avoid potential vm use-after-free Adding the vm to the vm_xa table makes it visible to userspace, which could try to race with us to close the vm. So we need to take our extra reference before putting it in the table. (cherry picked from commit 99343c46d4e2b34c285d3d5f68ff04274c2f9fb4)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.16<6.1.11 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Linux Kernel | =6.2-rc5 | |
Linux Kernel | =6.2-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52931 has been classified as a medium severity vulnerability within the Linux kernel.
To fix CVE-2023-52931, ensure you upgrade to the latest stable version of the Linux kernel that addresses this vulnerability.
CVE-2023-52931 affects various versions of the Linux kernel, specifically those from 5.16 up to 6.2-rc6.
CVE-2023-52931 involves a potential use-after-free vulnerability in the drm/i915 subsystem of the Linux kernel.
Yes, CVE-2023-52931 is potentially exploitable by userspace programs due to a race condition when closing virtual machines.