
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability has been identified in the Linux kernel's drm/i915 component (CVE-2023-52931). The issue occurs when adding a vm to the vm_xa table, which makes it visible to userspace and could potentially lead to a race condition during vm closure. This vulnerability affects Linux kernel versions from 5.16 up to (excluding) 6.1.11, as well as version 6.2 release candidates (rc1 through rc6) (NVD).
The vulnerability is classified as a Use-After-Free (CWE-416) issue in the Linux kernel's DRM Intel i915 graphics driver. The CVSS v3.1 base score is 7.8 (High), with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements with low attack complexity (NVD).
The vulnerability could potentially allow an attacker with local access to exploit a race condition, leading to use-after-free issues that could compromise system security. The high CVSS score indicates potential impacts on confidentiality, integrity, and availability of the system (NVD).
The vulnerability has been patched in the Linux kernel. The fix involves taking an extra reference before putting the vm in the table to prevent the race condition. The patch has been cherry-picked from commit 99343c46d4e2b34c285d3d5f68ff04274c2f9fb4 (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."