Bug 2245663 (CVE-2023-5633)

Summary: CVE-2023-5633 kernel: vmwgfx: reference count issue leads to use-after-free in surface handling
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: acaringi, allarkin, bhu, chwhite, cye, cyin, dbohanno, debarbos, dfreiber, dvlasenk, ezulian, gcovolo, hkrzesin, jarod, jburrell, jdenham, jfaracco, jforbes, jlelli, joe.lawrence, jpoimboe, jshortt, jstancek, jwyatt, kcarcia, ldoskova, lgoncalv, lzampier, mstowell, ndegraef, nmurray, ptalbert, rogbas, rparrazo, rrobaina, rvrbovsk, rysulliv, scweaver, tglozar, tyberry, vkumar, wcosta, williams, wmealing, ycote, ykopkova, zhijwang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: kernel 6.6-rc6 Doc Type: If docs needed, set a value
Doc Text:
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2245668    
Bug Blocks: 2245660    

Description Mauro Matteo Cascella 2023-10-23 13:51:37 UTC
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.

Upstream patch & commit:
https://lists.freedesktop.org/archives/dri-devel/2023-September/424805.html
https://github.com/torvalds/linux/commit/91398b413d03660fd5828f7b4abc64e884b98069

Comment 1 Mauro Matteo Cascella 2023-10-23 14:37:57 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2245668]

Comment 4 Justin M. Forbes 2023-10-23 17:20:24 UTC
This is fixed for Fedora with the 6.5.8 stable kernel update.

Comment 23 errata-xmlrpc 2024-01-10 10:42:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0113 https://access.redhat.com/errata/RHSA-2024:0113

Comment 24 errata-xmlrpc 2024-01-10 10:46:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:0134 https://access.redhat.com/errata/RHSA-2024:0134

Comment 25 errata-xmlrpc 2024-01-24 16:29:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:0461 https://access.redhat.com/errata/RHSA-2024:0461

Comment 26 errata-xmlrpc 2024-03-19 17:27:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:1404 https://access.redhat.com/errata/RHSA-2024:1404

Comment 32 errata-xmlrpc 2024-07-24 13:10:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:4823 https://access.redhat.com/errata/RHSA-2024:4823

Comment 33 errata-xmlrpc 2024-07-24 13:22:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:4831 https://access.redhat.com/errata/RHSA-2024:4831