This project will be discontinued after December 13, 2021. [more]
Product:
Codeready_linux_builder_for_power_little_endian
(Redhat)
Repositories
Unknown:
This might be proprietary software.
#Vulnerabilities
12
Date
Id
Summary
Products
Score
Patch
Annotated
2023-10-23
CVE-2023-5633
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.