发布时间: 2024年5月27日
修改时间: 2024年5月27日
In the Linux kernel, the following vulnerability has been resolved:fs/mount_setattr: always cleanup mount_kattrMake sure that finish_mount_kattr() is called after mount_kattr wassuccesfully built in both the success and failure case to preventleaking any references we took when we built it. We returned early ifpath lookup failed thereby risking to leak an additional reference wetook when building mount_kattr when an idmapped mount was requested.
NVD | openEuler | |
---|---|---|
CVSS评分 | 5.5 | 3.3 |
Attack Vector | Local | Local |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | High | Low |
Integrity | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-2259 | In the Linux kernel, the following vulnerability has been resolved:fs/mount_setattr: always cleanup mount_kattrMake sure that finish_mount_kattr() is called after mount_kattr wassuccesfully built in both the success and failure case to preventleaking any references we took when we built it. We returned early ifpath lookup failed thereby risking to leak an additional reference wetook when building mount_kattr when an idmapped mount was requested. | 2024年5月27日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Unaffected |
KY3.4-5 | kernel | Unaffected |
KY3.5.1 | kernel | Unaffected |
KY3.5.2 | kernel | Unaffected |