CVE-2023-33952

CWE-415CWE-9118 documents7 sources
Severity
6.7MEDIUM
EPSS
0.0%
top 99.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 24
Latest updateSep 28

Description

A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages2 packages

Debianlinux< 6.1.15-1+2

Also affects: Enterprise Linux 8.0, 9.0

Patches

🔴Vulnerability Details

3
CVEList
Kernel: vmwgfx: double free within the handling of vmw_buffer_object objects2023-07-24
GHSA
GHSA-8f4h-wr7j-w67m: A double-free vulnerability was found in the vmwgfx driver in the Linux kernel2023-07-24
OSV
CVE-2023-33952: A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel2023-07-24

📋Vendor Advisories

4
Red Hat
kernel: vmwgfx: reference count issue leads to use-after-free in surface handling2023-09-28
Microsoft
Kernel: vmwgfx: double free within the handling of vmw_buffer_object objects2023-07-11
Red Hat
kernel: vmwgfx: double free within the handling of vmw_buffer_object objects2023-02-15
Debian
CVE-2023-33952: linux - A double-free vulnerability was found in handling vmw_buffer_object objects in t...2023