« List of all CVEs

CVE-2023-33952

Kernel: vmwgfx: double free within the handling of vmw_buffer_object objects

Published: 7/24/2023 Last updated: 11/15/2024 Reserved: 5/24/2023

A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 6.7 Medium CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Opam packages affected (27)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (11)

Product Vendor Version
Red Hat Enterprise Linux 6 Red Hat 7.1.2
Red Hat Enterprise Linux 7 Red Hat n/a
Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat n/a
Red Hat Enterprise Linux 9 Red Hat 21.sp1 ap358328
Red Hat Enterprise Linux 9 Red Hat 21.sp1 ap358338
Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat WSA8835
Red Hat Enterprise Linux 8 Red Hat WCN3680B
Red Hat Enterprise Linux 9 Red Hat n/a
Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat 7.1
Red Hat Enterprise Linux 7 Red Hat >= 10.92.1, < 2024.11.0-alpha.3
Red Hat Enterprise Linux 8 Red Hat 21.sp1 ap359029

References (18)