Use-After-Free Vulnerability in AMD GPU Driver for Linux Kernel
CVE-2023-51042
7.8HIGH
Summary
A use-after-free vulnerability has been identified in the AMD GPU driver within the Linux kernel before version 6.4.12. The vulnerability is rooted in the amdgpu_cs_wait_all_fences function, where improper management of fences can lead to potential system instability and security issues. The flaw allows for exploitation by an attacker to manipulate memory that has already been freed, which could result in unauthorized access or system crashes. It is crucial for users of affected versions to apply the latest kernel updates to mitigate this risk.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database