vulnerability
Red Hat: CVE-2023-5633: kernel: vmwgfx: reference count issue leads to use-after-free in surface handling (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 2023-10-23 | 2024-01-11 | 2024-12-05 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
2023-10-23
Added
2024-01-11
Modified
2024-12-05
Description
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
Solution(s)
redhat-upgrade-kernelredhat-upgrade-kernel-rt

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.