amdgpu: use-after-free in amdgpu (CVE-2023-52921) #shorts #breaking
CVE
This CVE involves a use-after-free vulnerability found in the AMD GPU driver of the Linux kernel. Specifically, it occurs within the amdgpu_cs_pass1() function when handling chunk data. The issue arises because the gang_size check is not properly coordinated with the data parsing loop, leading to potential misuse of memory after it has been released. Although not classified as a zero-day vulnerability, it can still pose a risk, particularly to Linux users with AMD GPUs, by enabling attackers to cause a denial of service. This issue has been identified and reported by Ye Zhang from Baidu Security and has since been addressed in updated versions of the Linux kernel.
Watch the full video on YouTube: CVE-2023-52921
Remediation and exploitation details
This chain involves the following actors
This following systems are involved
Attack entry point
Remediation actions
Exploitation actions
Related Content
NOTE: The following related content has not been vetted and may be unsafe.