发布时间: 2023年7月19日
修改时间: 2024年2月26日
A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. Quoting ZDI security advisory [1]: This vulnerability allows local attackers to disclose sensitive information on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of GEM objects. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to disclose information in the context of the kernel. [1] https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Local | Local |
CVSS评分 | 5.3 | 6.7 |
Attack Complexity | High | Low |
Privileges Required | High | High |
Scope | Changed | Changed |
Integrity | None | None |
User Interaction | None | None |
Availability | None | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1533 | A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. Quoting ZDI security advisory [1]: This vulnerability allows local attackers to disclose sensitive information on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of GEM objects. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to disclose information in the context of the kernel. [1] https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/ | 2023年7月19日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Unaffected |
KY3.4-5 | kernel | Unaffected |
KY3.5.1 | kernel | Unaffected |
KY3.5.2 | kernel | Unaffected |