CVE-2023-54202
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: fix race condition UAF in i915_perf_add_config_ioctl
Userspace can guess the id value and try to race oa_config object creation with config remove, resulting in a use-after-free if we dereference the object after unlocking the metrics_lock. For that reason, unlocking the metrics_lock must be done after we are done dereferencing the object.
[tursulin: Manually added stable tag.] (cherry picked from commit 49f6f6483b652108bcb73accd0204a464b922395)
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in the Linux kernel's i915 driver can lead to a use-after-free when creating OA config objects.
Vulnerability
Overview
A use-after-free (UAF) vulnerability exists in the Linux kernel's i915 graphics driver, specifically in the i915_perf_add_config_ioctl function. The root cause is a race condition where userspace can guess an oa_config object's ID and race the object creation with a concurrent removal operation. If the object is dereferenced after the metrics_lock is released, the freed memory can be accessed, leading to a UAF condition [1].
Exploitation
To exploit this vulnerability, an attacker must have local access to the system and the system and be able to interact with the i915 perf subsystem. The attack requires precise timing to guess the ID of an oa_config object and trigger the race between creation and removal. No special privileges beyond normal user access to the DRM subsystem are mentioned in the source [1].
Impact
Successful exploitation could allow an attacker to cause a denial of service (system crash) or potentially escalate privileges, as UAF bugs in kernel drivers often lead to arbitrary code execution. The vulnerability is classified as a high-severity issue due to the possibility for local privilege escalation [1].
Mitigation
The fix has been applied in the Linux kernel stable tree via commit 49f6f6483b652108bcb73accd0204a464b922395, which ensures that the metrics_lock is not released until after all dereferences of the oa_config object are complete [1]. Users should apply the latest kernel updates to their distribution to remediate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
46eeb1cba4c9d240b150270887eb98f5ac551dc30c0114691Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.