First published: Wed Feb 15 2023(Updated: )
A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. Quoting ZDI security advisory [1]: "This vulnerability allows local attackers to disclose sensitive information on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of GEM objects. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to disclose information in the context of the kernel." [1] <a href="https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/">https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.4 | 6.4 |
Linux Kernel | <=6.3.9 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
redhat enterprise Linux for real time | =8.0 | |
redhat enterprise Linux for real time for nfv | =8.0 | |
Linux kernel | ||
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 |
This flaw can be mitigated by preventing the affected `vmwgfx` kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33951 is a vulnerability in the vmwgfx driver in the Linux Kernel, which allows local attackers to disclose sensitive information on affected installations.
The vulnerability occurs due to a race condition in the handling of the vmwgfx driver in the Linux Kernel, allowing local attackers with high-privileged code execution to disclose sensitive information.
The severity of CVE-2023-33951 is medium with a CVSS score of 6.7.
Affected software includes Linux Kernel versions up to and excluding 6.4, Linux Kernel in general, Redhat Enterprise Linux 8.0, and Redhat Enterprise Linux 9.0.
To fix the vulnerability, update the Linux Kernel to version 6.4 or apply the necessary patches provided by the respective vendors.