-
CVE-2023-53552
- EPSS 0.02%
- Published 04.10.2025 15:16:58
- Last modified 06.10.2025 14:56:21
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: drm/i915: mark requests for GuC virtual engines to avoid use-after-free References to i915_requests may be trapped by userspace inside a sync_file or dmabuf (dma-resv) and held indefinitely across different proceses. To counter-act the memory leaks, we try to not to keep references from the request past their completion. On the other side on fence release we need to know if rq->engine is valid and points to hw engine (true for non-virtual requests). To make it possible extra bit has been added to rq->execution_mask, for marking virtual engines. (cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
8017a27cec32eac8c8f9430b0a3055840136b856
Version
bcb9aa45d5a0e11ef91245330c53cde214d15e8d
Status
affected
Version <
7fb464d52fa41c31a6fd1ad82888e67c65935d94
Version
bcb9aa45d5a0e11ef91245330c53cde214d15e8d
Status
affected
Version <
5eefc5307c983b59344a4cb89009819f580c84fa
Version
bcb9aa45d5a0e11ef91245330c53cde214d15e8d
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.0
Status
affected
Version <
6.0
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.54
Status
unaffected
Version <=
6.5.*
Version
6.5.4
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.029 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|