Количество 7
Количество 7
CVE-2024-41024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-41024
A vulnerability was found in the Linux kernel's `fastrpc` driver at allows untrusted applications with access to non-secure `fastrpc` device nodes to attach to privileged Processing Domains (PDs) such as `root_pd` or static PDs. This could lead to unauthorized access and potential exploitation.
CVE-2024-41024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
GHSA-5r86-7p4c-pw27
In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Restrict untrusted app to attach to privileged PD Untrusted application with access to only non-secure fastrpc device node can attach to root_pd or static PDs if it can make the respective init request. This can cause problems as the untrusted application can send bad requests to root_pd or static PDs. Add changes to reject attach to privileged PDs if the request is being made using non-secure fastrpc device node.
SUSE-SU-2024:3195-1
Security update for the Linux Kernel
SUSE-SU-2024:3383-1
Security update for the Linux Kernel
SUSE-SU-2024:3194-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-41024 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
CVE-2024-41024 A vulnerability was found in the Linux kernel's `fastrpc` driver at allows untrusted applications with access to non-secure `fastrpc` device nodes to attach to privileged Processing Domains (PDs) such as `root_pd` or static PDs. This could lead to unauthorized access and potential exploitation. | CVSS3: 7 | больше 1 года назад | ||
CVE-2024-41024 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | больше 1 года назад | |||
GHSA-5r86-7p4c-pw27 In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Restrict untrusted app to attach to privileged PD Untrusted application with access to only non-secure fastrpc device node can attach to root_pd or static PDs if it can make the respective init request. This can cause problems as the untrusted application can send bad requests to root_pd or static PDs. Add changes to reject attach to privileged PDs if the request is being made using non-secure fastrpc device node. | больше 1 года назад | |||
SUSE-SU-2024:3195-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:3383-1 Security update for the Linux Kernel | больше 1 года назад | |||
SUSE-SU-2024:3194-1 Security update for the Linux Kernel | больше 1 года назад |
Уязвимостей на страницу