发布时间: 2024年3月29日
修改时间: 2024年5月27日
In the Linux kernel, the following vulnerability has been resolved: ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook The commit 1879445dfa7b ("perf/core: Set event's default ::overflow_handler()") set a default event->overflow_handler in perf_event_alloc(), and replace the check event->overflow_handler with is_default_overflow_handler(), but one is missing. Currently, the bp->overflow_handler can not be NULL. As a result, enable_single_step() is always not invoked. Comments from Zhen Lei: https://patchwork.kernel.org/project/linux-arm-kernel/patch/20210207105934.2001-1-thunder.leizhen@huawei.com/
NVD | openEuler | |
---|---|---|
CVSS评分 | 4.4 | |
Attack Vector | Local | |
Attack Complexity | Low | |
Privileges Required | High | |
User Interaction | None | |
Scope | Unchanged | |
Confidentiality | None | |
Integrity | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4769 | kernel security update | 2024年3月29日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | kernel | Fixed |
KY3.4-5A | kernel | Fixed |
KY3.5.1 | kernel | Unaffected |
KY3.5.2 | kernel | Unaffected |