vulnerability
Red Hat: CVE-2023-53228: kernel: drm/amdgpu: drop redundant sched job cleanup when cs is aborted (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:M/Au:S/C:N/I:P/A:C) | Sep 15, 2025 | Nov 14, 2025 | Dec 5, 2025 |
Severity
5
CVSS
(AV:L/AC:M/Au:S/C:N/I:P/A:C)
Published
Sep 15, 2025
Added
Nov 14, 2025
Modified
Dec 5, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: drop redundant sched job cleanup when cs is aborted
Once command submission failed due to userptr invalidation in
amdgpu_cs_submit, legacy code will perform cleanup of scheduler
job. However, it's not needed at all, as former commit has integrated
job cleanup stuff into amdgpu_job_free. Otherwise, because of double
free, a NULL pointer dereference will occur in such scenario.
Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/2457
Solutions
redhat-upgrade-kernelredhat-upgrade-kernel-rt
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.