Описание
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
Меры по смягчению последствий
This flaw can be mitigated by turning off 3D acceleration in VMware (if possible) or preventing the affected vmwgfx
kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel | Not affected | ||
Red Hat Enterprise Linux 7 | kernel-rt | Not affected | ||
Red Hat Enterprise Linux 9 | kernel-rt | Affected | ||
Red Hat Enterprise Linux 8 | kernel-rt | Fixed | RHSA-2024:0134 | 10.01.2024 |
Red Hat Enterprise Linux 8 | kernel | Fixed | RHSA-2024:0113 | 10.01.2024 |
Red Hat Enterprise Linux 8.8 Extended Update Support | kernel | Fixed | RHSA-2024:1404 | 19.03.2024 |
Red Hat Enterprise Linux 9 | kernel | Fixed | RHSA-2024:0461 | 25.01.2024 |
Red Hat Enterprise Linux 9 | kernel | Fixed | RHSA-2024:0461 | 25.01.2024 |
Red Hat Enterprise Linux 9.2 Extended Update Support | kernel | Fixed | RHSA-2024:4823 | 24.07.2024 |
Показывать по
Дополнительная информация
Статус:
7.8 High
CVSS3
Связанные уязвимости
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
The reference count changes made as part of the CVE-2023-33951 and CVE ...
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
7.8 High
CVSS3