
Cloud Vulnerability DB
A community-led vulnerabilities database
The Linux kernel 6.3 contains a use-after-free vulnerability (CVE-2023-33250) in the ioptunmapiovarange function located in drivers/iommu/iommufd/iopagetable.c. The vulnerability was discovered on May 21, 2023, and affects the Linux kernel version 6.3 (NVD, SUSE).
The vulnerability is a use-after-free issue that occurs when accessing the area pointer after unlocking in the ioptunmapiovarange function. The CVSS v3.1 base score is 4.4 (Medium) with the vector: AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H. The bug was introduced by commit 51fe6141f0f6 'iommufd: Data structure to provide IOVA to PFN mapping' ([SUSE](https://bugzilla.suse.com/showbug.cgi?id=1211597), Kernel Commit).
When successfully exploited, this vulnerability could lead to a denial of service condition. The vulnerability affects the availability of the system but does not impact confidentiality or integrity (NVD).
The vulnerability has been fixed in Linux kernel 6.4.4 through two patches: dbe245cdf518 'iommufd: Call ioptareacontigdone() under the lock' and 804ca14d04df 'iommufd: Do not access the area pointer after unlocking'. SLE branches are not affected as the vulnerable commit 51fe6141f0f6 is not included in any of them ([SUSE](https://bugzilla.suse.com/showbug.cgi?id=1211597)).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."