VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2023-53816

CVE-2023-53816

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix potential kgd_mem UAFs

kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while p->mutex is held. As soon as the mutex is unlocked, another thread can free the BO.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A use-after-free vulnerability in the Linux kernel's AMD KFD driver allows local privilege escalation when a kgd_mem pointer is accessed after its mutex is released.

Vulnerability

CVE-2023-53816 is a use-after-free (UAF) vulnerability in the Linux kernel's AMD KFD (Kernel Fusion Driver) component. The root cause is that kgd_mem pointers returned by kfd_process_device_translate_handle are only guaranteed to be valid while the process mutex (p->mutex) is held. Once the mutex is unlocked, another thread can free the buffer object (BO), leading to a dangling pointer [1].

Exploitation

An attacker with local access and the ability to execute code on the system can trigger this vulnerability by racing a memory allocation and deallocation in the KFD driver. The attack requires the ability to call the affected IOCTL functions that use kfd_process_device_translate_handle without holding the mutex. No special privileges beyond local user access are needed, but the attacker must be able to interact with the AMD GPU device [1].

Impact

Successful exploitation can lead to a use-after-free condition, which may allow an attacker to corrupt kernel memory, cause a denial of service, or potentially escalate privileges to root. The vulnerability is rated with a CVSS score of 7.8 (High) [1].

Mitigation

The fix is included in the Linux kernel stable update that patches this commit is part of. Users should apply the latest kernel updates from their distribution. No workaround is available; updating the kernel is the recommended mitigation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.