CVE-2023-5633
Summary
| CVE | CVE-2023-5633 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-23 22:15:00 UTC |
| Updated | 2024-01-25 20:15:00 UTC |
| Description | The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges. |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161404 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-0461)
- 199938 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6503-1)
- 199982 Ubuntu Security Notification for Linux kernel (GCP) Vulnerability (USN-6537-1)
- 200182 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6688-1)
- 242839 Red Hat Update for kernel (RHSA-2024:0461)
- 243087 Red Hat Update for kernel (RHSA-2024:1404)
- 941540 AlmaLinux Security Update for kernel (ALSA-2024:0113)
- 961107 Rocky Linux Security Update for kernel-rt (RLSA-2024:0134)