Описание
Mismatches in interpreting USB authorization policy between GNOME Settings Daemon (GSD) through 46.0 and the Linux kernel's underlying device matching logic allow a physically proximate attacker to access some unintended Linux kernel USB functionality, such as USB device-specific kernel modules and filesystem implementations. NOTE: the GSD supplier indicates that consideration of a mitigation for this within GSD would be in the context of "a new feature, not a CVE."
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | disputed |
| esm-infra/bionic | not-affected | disputed |
| esm-infra/focal | not-affected | disputed |
| esm-infra/xenial | not-affected | disputed |
| focal | not-affected | disputed |
| jammy | not-affected | disputed |
| mantic | ignored | end of life, was deferred [2024-07-18] |
| noble | not-affected | disputed |
| upstream | needs-triage |
Показывать по
EPSS
4.3 Medium
CVSS3
Связанные уязвимости
Mismatches in interpreting USB authorization policy between GNOME Settings Daemon (GSD) through 46.0 and the Linux kernel's underlying device matching logic allow a physically proximate attacker to access some unintended Linux kernel USB functionality, such as USB device-specific kernel modules and filesystem implementations. NOTE: the GSD supplier indicates that consideration of a mitigation for this within GSD would be in the context of "a new feature, not a CVE."
Mismatches in interpreting USB authorization policy between GNOME Settings Daemon (GSD) through 46.0 and the Linux kernel's underlying device matching logic allow a physically proximate attacker to access some unintended Linux kernel USB functionality, such as USB device-specific kernel modules and filesystem implementations. NOTE: the GSD supplier indicates that consideration of a mitigation for this within GSD would be in the context of "a new feature, not a CVE."
Mismatches in interpreting USB authorization policy between GNOME Sett ...
EPSS
4.3 Medium
CVSS3