Vulnerability Details : CVE-2024-24861
A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return value overflow issue, possibly leading to malfunction or denial of service issue.
Vulnerability category: Denial of service
Products affected by CVE-2024-24861
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-24861
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-24861
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H |
1.0
|
5.2
|
NIST | 2024-02-10 |
3.3
|
LOW | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L |
0.8
|
2.5
|
OpenAnolis | 2024-02-05 |
CWE ids for CVE-2024-24861
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by:
- nvd@nist.gov (Primary)
- security@openanolis.org (Secondary)
References for CVE-2024-24861
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
[SECURITY] [DLA 3840-1] linux security update
-
https://bugzilla.openanolis.cn/show_bug.cgi?id=8150
Bug Access DeniedPermissions Required
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
[SECURITY] [DLA 3842-1] linux-5.10 security update
Jump to