CVE-2023-52931
Published: 27 March 2025
Description
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Security Summary
CVE-2023-52931 is a use-after-free vulnerability in the Linux kernel's drm/i915 driver, which handles Intel graphics processing. The issue arises when adding a virtual memory (VM) object to the vm_xa table, making it visible to userspace before taking an extra reference. This allows userspace to potentially race ahead and close the VM, leading to a use-after-free condition. The vulnerability is classified under CWE-416 (Use After Free) with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
A local attacker with low privileges can exploit this vulnerability due to its low attack complexity and lack of user interaction requirements. Successful exploitation could result in high-impact confidentiality, integrity, and availability violations, potentially enabling arbitrary code execution, privilege escalation, or system crashes within the context of the affected process.
The provided references point to stable kernel patch commits that resolve the issue: https://git.kernel.org/stable/c/41d419382ec7e257e54b7b6ff0d3623aafb1316d and https://git.kernel.org/stable/c/764accc2c1b8fd1507be2e7f436c94cdce887a00. These patches ensure an extra reference is taken on the VM before inserting it into the vm_xa table, preventing the race condition. Security practitioners should update to kernels incorporating these cherry-picked fixes from upstream commit 99343c46d4e2b34c285d3d5f68ff04274c2f9fb4.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Local kernel use-after-free in drm/i915 driver enables low-privileged attacker to trigger arbitrary code execution and privilege escalation.