Unrated severityNVD Advisory· Published Mar 27, 2025· Updated May 4, 2025
drm/amdkfd: Add sync after creating vram bo
CVE-2023-53009
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Add sync after creating vram bo
There will be data corruption on vram allocated by svm if the initialization is not complete and application is writting on the memory. Adding sync to wait for the initialization completion is to resolve this issue.
Affected products
37- osv-coords35 versionspkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP5_Update_26&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS
< 5.14.21-150500.55.103.1+ 34 more
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1.150500.6.49.1
- (no CPE)range: < 5.14.21-150500.55.103.1.150500.6.49.1
- (no CPE)range: < 5.14.21-150500.55.103.1.150500.6.49.1
- (no CPE)range: < 5.14.21-150500.55.103.1.150500.6.49.1
- (no CPE)range: < 5.14.21-150500.55.103.1.150500.6.49.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 1-150500.11.3.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.13.94.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.13.94.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
- (no CPE)range: < 5.14.21-150500.55.103.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.