CVE-2023-53816
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: fix potential kgd_mem UAFs
kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while p->mutex is held. As soon as the mutex is unlocked, another thread can free the BO.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free vulnerability in the Linux kernel's AMD KFD driver allows local privilege escalation when a kgd_mem pointer is accessed after its mutex is released.
Vulnerability
CVE-2023-53816 is a use-after-free (UAF) vulnerability in the Linux kernel's AMD KFD (Kernel Fusion Driver) component. The root cause is that kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while the process mutex (p->mutex) is held. Once the mutex is unlocked, another thread can free the buffer object (BO), leading to a dangling pointer [1].
Exploitation
An attacker with local access and the ability to execute code on the system can trigger this vulnerability by racing a memory allocation and deallocation in the KFD driver. The attack requires the ability to call the affected IOCTL functions that use kfd_process_device_translate_handle without holding the mutex. No special privileges beyond local user access are needed, but the attacker must be able to interact with the AMD GPU device [1].
Impact
Successful exploitation can lead to a use-after-free condition, which may allow an attacker to corrupt kernel memory, cause a denial of service, or potentially escalate privileges to root. The vulnerability is rated with a CVSS score of 7.8 (High) [1].
Mitigation
The fix is included in the Linux kernel stable update that patches this commit is part of. Users should apply the latest kernel updates from their distribution. No workaround is available; updating the kernel is the recommended mitigation [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
35045360f3bb65ca14fb5552a9da050b0d9e0Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.