CVE-2023-53090

7.1 HIGH

📋 TL;DR

A memory access vulnerability in the Linux kernel's AMD KFD driver allows local attackers to cause a kernel crash (denial of service) when copy_from_user() fails during event waiting operations. This affects Linux systems with AMD GPU hardware using the affected kernel versions. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux kernel with AMD KFD (Kernel Fusion Driver) support
Versions: Specific kernel versions with the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD GPU hardware using the KFD driver. The vulnerability is triggered when copy_from_user() fails in kfd_wait_on_events().

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

Local denial of service through kernel crash when specific IOCTL operations fail.

🟢

If Mitigated

No impact if system is patched or doesn't use AMD KFD driver.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users or processes can cause system crashes, affecting availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM - Requires local access and specific conditions to trigger the failure path.

Exploitation requires local access and triggering the copy_from_user() failure path in kfd_wait_on_events().

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits: 2fece63b55c5d74cd6f5de51159e2cde37e10555, 4fc8fff378b2f2039f2a666d9f8c570f4e58352c, 5a3fb3b745af0ce46ec2e0c8e507bae45b937334, 61f306f8df0d5559659c5578cf6d95236bcdcb25, 6936525142a015e854d0a23e9ad9ea0a28b3843d

Vendor Advisory: https://git.kernel.org/stable/c/2fece63b55c5d74cd6f5de51159e2cde37e10555

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Disable AMD KFD module

linux

Prevent loading of the vulnerable AMD KFD driver module

echo 'blacklist amdkfd' >> /etc/modprobe.d/blacklist-amdkfd.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with AMD GPUs
  • Implement strict privilege separation and limit who can access GPU-related system calls

🔍 How to Verify

Check if Vulnerable:

Check if AMD KFD module is loaded: lsmod | grep amdkfd AND check kernel version against affected ranges

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated AND test that kfd_wait_on_events() error handling doesn't crash

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning native_queued_spin_lock_slowpath
  • System crash logs with call trace showing kfd_wait_on_events

Network Indicators:

  • None - local vulnerability only

SIEM Query:

kernel_panic OR (call_trace CONTAINS 'kfd_wait_on_events')

🔗 References

📤 Share & Export