SB2024111928 - Use-after-free in Linux kernel amd amdgpu driver
Published: November 19, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-52921)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the amdgpu_cs_pass1() function in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/9a2393af1f35d1975204fc00035c64a1c792b278
- https://git.kernel.org/stable/c/e08e9dd09809b16f8f8cee8c466841b33d24ed96
- https://git.kernel.org/stable/c/90e065677e0362a777b9db97ea21d43a39211399
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.46
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.11
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5