发布时间: 2024年9月1日
修改时间: 2024年10月18日
In the Linux kernel, the following vulnerability has been resolved:efi: fix NULL-deref in init error pathIn cases where runtime services are not supported or have been disabled,the runtime services workqueue will never have been allocated.Do not try to destroy the workqueue unconditionally in the unlikelyevent that EFI initialisation fails to avoid dereferencing a NULLpointer.
NVD | openEuler | |
---|---|---|
CVSS评分 | 5.5 | 5.5 |
Attack Vector | Local | Local |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | None | None |
Integrity | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-3582 | In the Linux kernel, the following vulnerability has been resolved:efi: fix NULL-deref in init error pathIn cases where runtime services are not supported or have been disabled,the runtime services workqueue will never have been allocated.Do not try to destroy the workqueue unconditionally in the unlikelyevent that EFI initialisation fails to avoid dereferencing a NULLpointer. | 2024年9月1日 |
KylinSec-SA-2024-4883 | kernel security update | 2024年10月18日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | kernel | Fixed |
KY3.5.2 | kernel | Fixed |
KY3.5.2 | kernel | Unaffected |
V6 | kernel | Unaffected |