发布时间: 2024年7月6日
修改时间: 2024年7月12日
In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - Fix pointer arithmetic In spu2_dump_omd() value of ptr is increased by ciph_key_len instead of hash_iv_len which could lead to going beyond the buffer boundaries. Fix this bug by changing ciph_key_len to hash_iv_len. Found by Linux Verification Center (linuxtesting.org) with SVACE.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | |
Attack Vector | Local | |
CVSS评分 | N/A | 6.1 |
Attack Complexity | Low | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | None | |
User Interaction | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-3128 | kernel security update | 2024年7月12日 |
KylinSec-SA-2024-4801 | kernel security update | 2024年7月12日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | kernel | Fixed |
KY3.5.2 | kernel | Fixed |
KY3.5.2 | kernel | Unaffected |
V6 | kernel | Fixed |