[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-33952Date: (C)2023-07-24   (M)2024-05-10


A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 6.7CVSS Score :
Exploit Score: 0.8Exploit Score:
Impact Score: 5.9Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: HIGHAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
RHSA-2023:6583
RHSA-2023:6901
RHSA-2023:7077
RHSA-2024:1404
https://access.redhat.com/security/cve/CVE-2023-33952
https://bugzilla.redhat.com/show_bug.cgi?id=2218212
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292

CWE    1
CWE-415
OVAL    7
oval:org.secpod.oval:def:3302437
oval:org.secpod.oval:def:508048
oval:org.secpod.oval:def:95300
oval:org.secpod.oval:def:89049344
...

© SecPod Technologies