A double-free vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of vmw_buffer_object objects. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. This flaw allows a local privileged user to escalate privileges and execute code in the context of the kernel.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2023-33952 - Medium Severity Vulnerability
Vulnerable Libraries - linuxlinux-4.19.282, linuxlinux-4.19.282, linuxlinux-4.19.282, linuxlinux-4.19.282, linuxlinux-4.19.282, linuxlinux-4.19.282
Vulnerability Details
A double-free vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of vmw_buffer_object objects. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. This flaw allows a local privileged user to escalate privileges and execute code in the context of the kernel.
Publish Date: 2023-07-24
URL: CVE-2023-33952
CVSS 3 Score Details (6.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.linuxkernelcves.com/cves/CVE-2023-33952
Release Date: 2023-07-24
Fix Resolution: v6.1.13,v6.2,v6.3-rc1,v6.4-rc1
Step up your Open Source Security Game with Mend here