Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-05005

Опубликовано: 28 дек. 2024
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6
EPSS Низкий

Описание

Уязвимость компонента media ядра операционной системы Linux связана с разыменованием указателя NULL. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Novell Inc.
Сообщество свободного программного обеспечения
ООО «Ред Софт»
АО "НППКТ"

Наименование ПО

SUSE Linux Enterprise Live Patching
Debian GNU/Linux
РЕД ОС
Suse Linux Enterprise Desktop
Suse Linux Enterprise Server
SUSE Linux Enterprise Server for SAP Applications
SUSE Linux Enterprise High Performance Computing
SUSE Linux Enterprise Module for Basesystem
SUSE Linux Enterprise Workstation Extension
OpenSUSE Leap
SUSE Linux Enterprise Module for Development Tools
SUSE Linux Enterprise Micro
SUSE Linux Enterprise High Availability Extension
SUSE Linux Enterprise Module for Public Cloud
SUSE Linux Enterprise Real Time
SUSE Real Time Module
SUSE Linux Enterprise Module for Confidential Computing Technical Preview
Linux
SUSE Linux Enterprise Module for Legacy
ОСОН ОСнова Оnyx

Версия ПО

12 SP5 (SUSE Linux Enterprise Live Patching)
11 (Debian GNU/Linux)
12 (Debian GNU/Linux)
7.3 (РЕД ОС)
15 SP6 (Suse Linux Enterprise Desktop)
15 SP6 (Suse Linux Enterprise Server)
15 SP6 (SUSE Linux Enterprise Server for SAP Applications)
15 SP6 (SUSE Linux Enterprise High Performance Computing)
15 SP6 (SUSE Linux Enterprise Module for Basesystem)
15 SP6 (SUSE Linux Enterprise Workstation Extension)
15.6 (OpenSUSE Leap)
15 SP6 (SUSE Linux Enterprise Module for Development Tools)
6.0 (SUSE Linux Enterprise Micro)
15 SP6 (SUSE Linux Enterprise High Availability Extension)
15 SP6 (SUSE Linux Enterprise Live Patching)
15 SP6 (SUSE Linux Enterprise Module for Public Cloud)
15 SP6 (SUSE Linux Enterprise Real Time)
15 SP6 (SUSE Real Time Module)
12 SP5-LTSS (Suse Linux Enterprise Server)
12 SP5 LTSS Extended Security (Suse Linux Enterprise Server)
15 SP6 (SUSE Linux Enterprise Module for Confidential Computing Technical Preview)
6.1 (SUSE Linux Enterprise Micro)
от 5.10 до 5.10.231 (Linux)
от 5.15 до 5.15.174 (Linux)
от 6.1 до 6.1.120 (Linux)
от 6.6 до 6.6.64 (Linux)
от 6.11 до 6.11.11 (Linux)
от 6.12 до 6.12.2 (Linux)
от 5.4 до 5.4.287 (Linux)
15 SP6 (SUSE Linux Enterprise Module for Legacy)
до 6.13 rc1 (Linux)
от 2.6.39 до 4.19.235 (Linux)
до 2.13 (ОСОН ОСнова Оnyx)

Тип ПО

Прикладное ПО информационных систем
Операционная система

Операционные системы и аппаратные платформы

Сообщество свободного программного обеспечения Debian GNU/Linux 11
Сообщество свободного программного обеспечения Debian GNU/Linux 12
ООО «Ред Софт» РЕД ОС 7.3
Novell Inc. Suse Linux Enterprise Desktop 15 SP6
Novell Inc. Suse Linux Enterprise Server 15 SP6
Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP6
Novell Inc. OpenSUSE Leap 15.6
Novell Inc. SUSE Linux Enterprise Real Time 15 SP6
Novell Inc. Suse Linux Enterprise Server 12 SP5-LTSS
Novell Inc. Suse Linux Enterprise Server 12 SP5 LTSS Extended Security
Сообщество свободного программного обеспечения Linux от 5.10 до 5.10.231
Сообщество свободного программного обеспечения Linux от 5.15 до 5.15.174
Сообщество свободного программного обеспечения Linux от 6.1 до 6.1.120
Сообщество свободного программного обеспечения Linux от 6.6 до 6.6.64
Сообщество свободного программного обеспечения Linux от 6.11 до 6.11.11
Сообщество свободного программного обеспечения Linux от 6.12 до 6.12.2
Сообщество свободного программного обеспечения Linux от 5.4 до 5.4.287
Сообщество свободного программного обеспечения Linux до 6.13 rc1
Сообщество свободного программного обеспечения Linux от 2.6.39 до 4.19.235
АО "НППКТ" ОСОН ОСнова Оnyx до 2.13

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

В условиях отсутствия обновлений безопасности от производителя рекомендуется придерживаться "Рекомендаций по безопасной настройке операционных систем LINUX", изложенных в методическом документе ФСТЭК России, утверждённом 25 декабря 2022 года.
Использование рекомендаций:
Для Linux:
https://lore.kernel.org/linux-cve-announce/2024122836-CVE-2024-56700-d3d1@gregkh/
https://git.kernel.org/stable/c/d16109c9fdc1b8cea4fe63b42e06e926c3f68990
https://git.kernel.org/stable/c/3c818ad07e964bca3d27adac1e1f50e1e3c9180e
https://git.kernel.org/stable/c/d7408a052aa1b4f6fb6f1c7a8877b84017a07ac9
https://git.kernel.org/stable/c/ed228b74d8a500380150965d5becabf9a1e33141
https://git.kernel.org/stable/c/372dc9509122e5d45d4c12978e31c3c7d00aaca4
https://git.kernel.org/stable/c/378ce4e08ca2b1ac7bbf1d57b68643ca4226c5f8
https://git.kernel.org/stable/c/2e63c908de357048180516b84740ed62dac0b269
https://git.kernel.org/stable/c/80a3b2ee01eecf22dfa06968b3cde92c691dea10
https://git.kernel.org/stable/c/ca59f9956d4519ab18ab2270be47c6b8c6ced091
Для РедОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2024-56700
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2024-56700.html
Обновление программного обеспечения linux до версии 6.6.90-0.osnova2u1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 26%
0.00087
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: media: wl128x: Fix atomicity violation in fmc_send_cmd() Atomicity violation occurs when the fmc_send_cmd() function is executed simultaneously with the modification of the fmdev->resp_skb value. Consider a scenario where, after passing the validity check within the function, a non-null fmdev->resp_skb variable is assigned a null value. This results in an invalid fmdev->resp_skb variable passing the validity check. As seen in the later part of the function, skb = fmdev->resp_skb; when the invalid fmdev->resp_skb passes the check, a null pointer dereference error may occur at line 478, evt_hdr = (void *)skb->data; To address this issue, it is recommended to include the validity check of fmdev->resp_skb within the locked section of the function. This modification ensures that the value of fmdev->resp_skb does not change during the validation process, thereby maintaining its validity. This possible bug is found by ...

CVSS3: 5.5
redhat
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: media: wl128x: Fix atomicity violation in fmc_send_cmd() Atomicity violation occurs when the fmc_send_cmd() function is executed simultaneously with the modification of the fmdev->resp_skb value. Consider a scenario where, after passing the validity check within the function, a non-null fmdev->resp_skb variable is assigned a null value. This results in an invalid fmdev->resp_skb variable passing the validity check. As seen in the later part of the function, skb = fmdev->resp_skb; when the invalid fmdev->resp_skb passes the check, a null pointer dereference error may occur at line 478, evt_hdr = (void *)skb->data; To address this issue, it is recommended to include the validity check of fmdev->resp_skb within the locked section of the function. This modification ensures that the value of fmdev->resp_skb does not change during the validation process, thereby maintaining its validity. This possible bug is found by an e...

nvd
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: media: wl128x: Fix atomicity violation in fmc_send_cmd() Atomicity violation occurs when the fmc_send_cmd() function is executed simultaneously with the modification of the fmdev->resp_skb value. Consider a scenario where, after passing the validity check within the function, a non-null fmdev->resp_skb variable is assigned a null value. This results in an invalid fmdev->resp_skb variable passing the validity check. As seen in the later part of the function, skb = fmdev->resp_skb; when the invalid fmdev->resp_skb passes the check, a null pointer dereference error may occur at line 478, evt_hdr = (void *)skb->data; To address this issue, it is recommended to include the validity check of fmdev->resp_skb within the locked section of the function. This modification ensures that the value of fmdev->resp_skb does not change during the validation process, thereby maintaining its validity. This possible bug is found by an

debian
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: m ...

github
6 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: media: wl128x: Fix atomicity violation in fmc_send_cmd() Atomicity violation occurs when the fmc_send_cmd() function is executed simultaneously with the modification of the fmdev->resp_skb value. Consider a scenario where, after passing the validity check within the function, a non-null fmdev->resp_skb variable is assigned a null value. This results in an invalid fmdev->resp_skb variable passing the validity check. As seen in the later part of the function, skb = fmdev->resp_skb; when the invalid fmdev->resp_skb passes the check, a null pointer dereference error may occur at line 478, evt_hdr = (void *)skb->data; To address this issue, it is recommended to include the validity check of fmdev->resp_skb within the locked section of the function. This modification ensures that the value of fmdev->resp_skb does not change during the validation process, thereby maintaining its validity. This possible bug is found by ...

EPSS

Процентиль: 26%
0.00087
Низкий

5.5 Medium

CVSS3

4.6 Medium

CVSS2