The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
| Version | Score | Severity | Vector String |
|---|---|---|---|
| 3.1 | 7.8 | High | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| Product | Vendor | Version |
|---|---|---|
| Red Hat Enterprise Linux 8 | Red Hat | <= 5.15.* |
| Red Hat Enterprise Linux 8.8 Extended Update Support | Red Hat | <= 5.10.* |
| Red Hat Enterprise Linux 9 | Red Hat | 8d924b262f3178a9b17c17d4306a9f426c508bd9 |
| Red Hat Enterprise Linux 9.2 Extended Update Support | Red Hat | <= 5.16.* |
| Red Hat Enterprise Linux 6 | Red Hat | <= 5.15.* |
| Red Hat Enterprise Linux 7 | Red Hat | <= 5.17.* |
| Red Hat Enterprise Linux 9 | Red Hat | <= 5.16.* |