CVE-2023-52913

Source
https://cve.org/CVERecord?id=CVE-2023-52913
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52913.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52913
Downstream
Related
Published
2024-08-21T06:10:54.540Z
Modified
2026-03-12T03:27:48.085366Z
Summary
drm/i915: Fix potential context UAFs
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix potential context UAFs

gemcontextregister() makes the context visible to userspace, and which point a separate thread can trigger the I915GEMCONTEXTDESTROY ioctl. So we need to ensure that nothing uses the ctx ptr after this. And we need to ensure that adding the ctx to the xarray is the last thing that gemcontext_register() does with the ctx pointer.

[tursulin: Stable and fixes tags add/tidy.] (cherry picked from commit bed4b455cf5374e68879be56971c1da563bcd90c)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52913.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
eb4dedae920a07c485328af3da2202ec5184fb17
Fixed
ae278887193110dfeb857ea63e243a3851fbb0bc
Fixed
b696c627b3f56e173f7f70b8487d66da8ff22506
Fixed
afce71ff6daa9c0f852df0727fe32c6fb107f0fa

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52913.json"