vulnerability
Ubuntu: (Multiple Advisories) (CVE-2023-52913): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Aug 21, 2024 | Feb 25, 2025 | Apr 25, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Aug 21, 2024
Added
Feb 25, 2025
Modified
Apr 25, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Fix potential context UAFs
gem_context_register() makes the context visible to userspace, and which
point a separate thread can trigger the I915_GEM_CONTEXT_DESTROY ioctl.
So we need to ensure that nothing uses the ctx ptr after this. And we
need to ensure that adding the ctx to the xarray is the *last* thing
that gem_context_register() does with the ctx pointer.
[tursulin: Stable and fixes tags add/tidy.]
(cherry picked from commit bed4b455cf5374e68879be56971c1da563bcd90c)
Solution(s)
ubuntu-upgrade-linux-image-5-15-0-1021-nvidia-tegra-igxubuntu-upgrade-linux-image-5-15-0-1021-nvidia-tegra-igx-rtubuntu-upgrade-linux-image-5-15-0-1033-nvidia-tegraubuntu-upgrade-linux-image-5-15-0-1033-nvidia-tegra-rtubuntu-upgrade-linux-image-5-15-0-1044-xilinx-zynqmpubuntu-upgrade-linux-image-5-15-0-1060-gkeopubuntu-upgrade-linux-image-5-15-0-1070-ibmubuntu-upgrade-linux-image-5-15-0-1072-nvidiaubuntu-upgrade-linux-image-5-15-0-1072-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1072-raspiubuntu-upgrade-linux-image-5-15-0-1073-intel-iotgubuntu-upgrade-linux-image-5-15-0-1074-ibmubuntu-upgrade-linux-image-5-15-0-1075-gkeubuntu-upgrade-linux-image-5-15-0-1075-oracleubuntu-upgrade-linux-image-5-15-0-1076-kvmubuntu-upgrade-linux-image-5-15-0-1077-gcpubuntu-upgrade-linux-image-5-15-0-1078-awsubuntu-upgrade-linux-image-5-15-0-1080-awsubuntu-upgrade-linux-image-5-15-0-1081-azureubuntu-upgrade-linux-image-5-15-0-1081-azure-fdeubuntu-upgrade-linux-image-5-15-0-133-genericubuntu-upgrade-linux-image-5-15-0-133-generic-64kubuntu-upgrade-linux-image-5-15-0-133-generic-lpaeubuntu-upgrade-linux-image-5-15-0-133-lowlatencyubuntu-upgrade-linux-image-5-15-0-133-lowlatency-64kubuntu-upgrade-linux-image-5-15-0-134-genericubuntu-upgrade-linux-image-5-15-0-134-generic-64kubuntu-upgrade-linux-image-5-15-0-134-generic-lpaeubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-cvmubuntu-upgrade-linux-image-azure-fdeubuntu-upgrade-linux-image-azure-fde-lts-22-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-nvidia-tegraubuntu-upgrade-linux-image-nvidia-tegra-igxubuntu-upgrade-linux-image-nvidia-tegra-igx-rtubuntu-upgrade-linux-image-nvidia-tegra-rtubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-xilinx-zynqmp
References
- CVE-2023-52913
- https://attackerkb.com/topics/CVE-2023-52913
- UBUNTU-USN-7288-1
- UBUNTU-USN-7288-2
- UBUNTU-USN-7289-1
- UBUNTU-USN-7289-2
- UBUNTU-USN-7289-3
- UBUNTU-USN-7289-4
- UBUNTU-USN-7291-1
- UBUNTU-USN-7305-1
- UBUNTU-USN-7308-1
- UBUNTU-USN-7331-1
- UBUNTU-USN-7388-1
- UBUNTU-USN-7389-1
- UBUNTU-USN-7390-1
- UBUNTU-USN-7458-1
- URL-https://git.kernel.org/linus/afce71ff6daa9c0f852df0727fe32c6fb107f0fa
- URL-https://git.kernel.org/stable/c/afce71ff6daa9c0f852df0727fe32c6fb107f0fa
- URL-https://git.kernel.org/stable/c/b696c627b3f56e173f7f70b8487d66da8ff22506
- URL-https://ubuntu.com/security/notices/USN-7288-1
- URL-https://ubuntu.com/security/notices/USN-7289-1
- URL-https://www.cve.org/CVERecord?id=CVE-2023-52913

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.