Use After Free Affecting kernel-rt-debuginfo package, versions <0:4.18.0-553.94.1.rt7.435.el8_10


Severity

Recommended
0.0
high
0
10

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.03% (10th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ROCKY8-KERNELRTDEBUGINFO-15090774
  • published25 Jan 2026
  • disclosed4 Oct 2025

Introduced: 4 Oct 2025

CVE-2023-53552  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:8 kernel-rt-debuginfo to version 0:4.18.0-553.94.1.rt7.435.el8_10 or higher.
This issue was patched in RLSA-2026:0760.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-rt-debuginfo package and not the kernel-rt-debuginfo package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:8 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

drm/i915: mark requests for GuC virtual engines to avoid use-after-free

References to i915_requests may be trapped by userspace inside a sync_file or dmabuf (dma-resv) and held indefinitely across different proceses. To counter-act the memory leaks, we try to not to keep references from the request past their completion. On the other side on fence release we need to know if rq->engine is valid and points to hw engine (true for non-virtual requests). To make it possible extra bit has been added to rq->execution_mask, for marking virtual engines.

(cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)

CVSS Base Scores

version 3.1