A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.
Workaround:
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6583 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:6901 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7077 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1404 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4823 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4831 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-33952 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2218212 | third party advisory patch issue tracking |
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292 | third party advisory patch vdb entry |