The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges. Upstream patch & commit: https://lists.freedesktop.org/archives/dri-devel/2023-September/424805.html https://github.com/torvalds/linux/commit/91398b413d03660fd5828f7b4abc64e884b98069
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2245668]
This is fixed for Fedora with the 6.5.8 stable kernel update.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:0113 https://access.redhat.com/errata/RHSA-2024:0113
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:0134 https://access.redhat.com/errata/RHSA-2024:0134
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:0461 https://access.redhat.com/errata/RHSA-2024:0461
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:1404 https://access.redhat.com/errata/RHSA-2024:1404
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4823 https://access.redhat.com/errata/RHSA-2024:4823
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4831 https://access.redhat.com/errata/RHSA-2024:4831