Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-35830

Опубликовано: 17 мая 2024
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.7.12-1package
linuxfixed6.1.85-1bookwormpackage
linuxfixed5.10.216-1bullseyepackage

Примечания

  • https://git.kernel.org/linus/87399f1ff92203d65f1febf5919429f4bb613a02 (6.9-rc1)

EPSS

Процентиль: 50%
0.00268
Низкий

Связанные уязвимости

ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.

CVSS3: 5.5
redhat
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.

nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.

msrc
9 месяцев назад

Описание отсутствует

github
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.

EPSS

Процентиль: 50%
0.00268
Низкий