VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2023-54202

CVE-2023-54202

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/i915: fix race condition UAF in i915_perf_add_config_ioctl

Userspace can guess the id value and try to race oa_config object creation with config remove, resulting in a use-after-free if we dereference the object after unlocking the metrics_lock. For that reason, unlocking the metrics_lock must be done after we are done dereferencing the object.

[tursulin: Manually added stable tag.] (cherry picked from commit 49f6f6483b652108bcb73accd0204a464b922395)

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A race condition in the Linux kernel's i915 driver can lead to a use-after-free when creating OA config objects.

Vulnerability

Overview

A use-after-free (UAF) vulnerability exists in the Linux kernel's i915 graphics driver, specifically in the i915_perf_add_config_ioctl function. The root cause is a race condition where userspace can guess an oa_config object's ID and race the object creation with a concurrent removal operation. If the object is dereferenced after the metrics_lock is released, the freed memory can be accessed, leading to a UAF condition [1].

Exploitation

To exploit this vulnerability, an attacker must have local access to the system and the system and be able to interact with the i915 perf subsystem. The attack requires precise timing to guess the ID of an oa_config object and trigger the race between creation and removal. No special privileges beyond normal user access to the DRM subsystem are mentioned in the source [1].

Impact

Successful exploitation could allow an attacker to cause a denial of service (system crash) or potentially escalate privileges, as UAF bugs in kernel drivers often lead to arbitrary code execution. The vulnerability is classified as a high-severity issue due to the possibility for local privilege escalation [1].

Mitigation

The fix has been applied in the Linux kernel stable tree via commit 49f6f6483b652108bcb73accd0204a464b922395, which ensures that the metrics_lock is not released until after all dereferences of the oa_config object are complete [1]. Users should apply the latest kernel updates to their distribution to remediate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.