Inadequate lock protection within Xilinx Run time may allow a local attacker to trigger a Use-After-Free condition potentially resulting in loss of confidentiality or availability
The product does not lock or does not correctly lock a resource when the product must have exclusive access to the resource.