vulnerability
Ubuntu: (CVE-2023-33952): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:M/C:C/I:C/A:C) | Jul 24, 2023 | Nov 19, 2024 | Mar 27, 2026 |
Severity
7
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
Jul 24, 2023
Added
Nov 19, 2024
Modified
Mar 27, 2026
Description
A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-allwinnerubuntu-upgrade-linux-allwinner-5-19ubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-19ubuntu-upgrade-linux-azureubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-19ubuntu-upgrade-linux-hwe-5-19ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-19ubuntu-upgrade-linux-oem-6-1ubuntu-upgrade-linux-oracleubuntu-upgrade-linux-raspiubuntu-upgrade-linux-riscvubuntu-upgrade-linux-riscv-5-19ubuntu-upgrade-linux-starfiveubuntu-upgrade-linux-starfive-5-19
References
- CVE-2023-33952
- https://attackerkb.com/topics/CVE-2023-33952
- CWE-415
- EUVD-EUVD-2023-38088
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-38088
- https://git.kernel.org/linus/9ef8d83e8e25d5f1811b3a38eb1484f85f64296c
- https://www.cve.org/CVERecord?id=CVE-2023-33952
- https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.