CVE-2023-53047

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
02/05/2025
Last modified:
12/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tee: amdtee: fix race condition in amdtee_open_session<br /> <br /> There is a potential race condition in amdtee_open_session that may<br /> lead to use-after-free. For instance, in amdtee_open_session() after<br /> sess-&gt;sess_mask is set, and before setting:<br /> <br /> sess-&gt;session_info[i] = session_info;<br /> <br /> if amdtee_close_session() closes this same session, then &amp;#39;sess&amp;#39; data<br /> structure will be released, causing kernel panic when &amp;#39;sess&amp;#39; is<br /> accessed within amdtee_open_session().<br /> <br /> The solution is to set the bit sess-&gt;sess_mask as the last step in<br /> amdtee_open_session().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.6 (including) 5.10.177 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.105 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.2.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*