Описание
A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.
Отчет
Mounting a file system is a privileged operation controlled by polkit, So without admin authentication, it's difficult to exploit. And as for the Unprivileged users with an active session(e.g. GNOME session) can be affected by the auto-mounted devices. Hence the Priority is changed to low.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 7 | udisks2 | Out of support scope | ||
Red Hat Enterprise Linux 9 | udisks2 | Not affected | ||
Red Hat Enterprise Linux 8 | udisks2 | Fixed | RHSA-2022:1820 | 10.05.2022 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.5 Medium
CVSS3
Связанные уязвимости
A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.
A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.
A vulnerability found in udisks2. This flaw allows an attacker to inpu ...
EPSS
4.5 Medium
CVSS3