Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-53047


In the Linux kernel, the following vulnerability has been resolved: tee: amdtee: fix race condition in amdtee_open_session There is a potential race condition in amdtee_open_session that may lead to use-after-free. For instance, in amdtee_open_session() after sess->sess_mask is set, and before setting: sess->session_info[i] = session_info; if amdtee_close_session() closes this same session, then 'sess' data structure will be released, causing kernel panic when 'sess' is accessed within amdtee_open_session(). The solution is to set the bit sess->sess_mask as the last step in amdtee_open_session().


Published

2025-05-02T16:15:23.790

Last Modified

2025-11-12T16:46:56.800

Status

Analyzed

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 4.7 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-362

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 5.10.177 Yes
Operating System linux linux_kernel < 5.15.105 Yes
Operating System linux linux_kernel < 6.1.22 Yes
Operating System linux linux_kernel < 6.2.9 Yes
Operating System linux linux_kernel 6.3 Yes
Operating System linux linux_kernel 6.3 Yes
Operating System linux linux_kernel 6.3 Yes

References