CVE-2023-5633

Published Oct 23, 2023

Last updated 2 months ago

Overview

Description
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
Source
secalert@redhat.com
NVD status
Modified
Products
linux_kernel, codeready_linux_builder, codeready_linux_builder_eus, codeready_linux_builder_for_arm64, codeready_linux_builder_for_arm64_eus, codeready_linux_builder_for_ibm_z_systems, codeready_linux_builder_for_ibm_z_systems_eus, codeready_linux_builder_for_power_little_endian, codeready_linux_builder_for_power_little_endian_eus, enterprise_linux, enterprise_linux_eus, enterprise_linux_for_arm_64, enterprise_linux_for_arm_64_eus, enterprise_linux_for_ibm_z_systems, enterprise_linux_for_ibm_z_systems_eus, enterprise_linux_for_power_little_endian, enterprise_linux_for_power_little_endian_eus, enterprise_linux_for_real_time, enterprise_linux_for_real_time_for_nfv, enterprise_linux_server_aus, enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions, enterprise_linux_server_tus

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

secalert@redhat.com
CWE-911
nvd@nist.gov
CWE-416

Social media

Hype score
Not currently trending

Configurations