CVE-2023-53047
tee: amdtee: fix race condition in amdtee_open_session
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: tee: amdtee: fix race condition in amdtee_open_session There is a potential race condition in amdtee_open_session that may lead to use-after-free. For instance, in amdtee_open_session() after sess->sess_mask is set, and before setting: sess->session_info[i] = session_info; if amdtee_close_session() closes this same session, then 'sess' data structure will be released, causing kernel panic when 'sess' is accessed within amdtee_open_session(). The solution is to set the bit sess->sess_mask as the last step in amdtee_open_session().
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 2, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
757cc3e9ff1d72d014096399d6e2bf03974d9da1 < f632a90f8e39db39b322107b9a8d438b826a7f4f 757cc3e9ff1d72d014096399d6e2bf03974d9da1 < 02b296978a2137d7128151c542e84dc96400bc00 757cc3e9ff1d72d014096399d6e2bf03974d9da1 < a63cce9393e4e7dbc5af82dc87e68cb321cb1a78 757cc3e9ff1d72d014096399d6e2bf03974d9da1 < b3ef9e6fe09f1a132af28c623edcf4d4f39d9f35 757cc3e9ff1d72d014096399d6e2bf03974d9da1 < f8502fba45bd30e1a6a354d9d898bc99d1a11e6d
Linux / Linux
5.6
References
git.kernel.org: https://git.kernel.org/stable/c/f632a90f8e39db39b322107b9a8d438b826a7f4f git.kernel.org: https://git.kernel.org/stable/c/02b296978a2137d7128151c542e84dc96400bc00 git.kernel.org: https://git.kernel.org/stable/c/a63cce9393e4e7dbc5af82dc87e68cb321cb1a78 git.kernel.org: https://git.kernel.org/stable/c/b3ef9e6fe09f1a132af28c623edcf4d4f39d9f35 git.kernel.org: https://git.kernel.org/stable/c/f8502fba45bd30e1a6a354d9d898bc99d1a11e6d