### [CVE-2022-38457](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457) ![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.13.0-52%3E%3D%20v4.20-rc1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) ### Description A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS). ### POC #### Reference - https://bugzilla.openanolis.cn/show_bug.cgi?id=2074 #### Github No PoCs found on GitHub currently.