Cyber Posture

CVE-2023-52931

High

Published: 27 March 2025

Published
27 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2023-52931 is a use-after-free vulnerability in the Linux kernel's drm/i915 driver, which handles Intel graphics processing. The issue arises when adding a virtual memory (VM) object to the vm_xa table, making it visible to userspace before taking an extra reference. This allows userspace to potentially race ahead and close the VM, leading to a use-after-free condition. The vulnerability is classified under CWE-416 (Use After Free) with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability due to its low attack complexity and lack of user interaction requirements. Successful exploitation could result in high-impact confidentiality, integrity, and availability violations, potentially enabling arbitrary code execution, privilege escalation, or system crashes within the context of the affected process.

The provided references point to stable kernel patch commits that resolve the issue: https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d and https://git.kernel.org/stable/c/764accc2c1b8fd1507be2e7f436c94cdce887a00. These patches ensure an extra reference is taken on the VM before inserting it into the vm_xa table, preventing the race condition. Security practitioners should update to kernels incorporating these cherry-picked fixes from upstream commit 99343c46d4e2b34c285d3d5f68ff04274c2f9fb4.

Details

CWE(s)
CWE-416

Affected Products

linux
linux kernel
6.2 · 5.16 — 6.1.11

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local kernel use-after-free in drm/i915 driver enables low-privileged attacker to trigger arbitrary code execution and privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References