A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.
Workaround:
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6583 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:6901 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7077 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1404 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4823 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:4831 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-33951 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2218195 | issue tracking patch |
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/ | third party advisory vdb entry |