Lucene search

K
redosRedosROS-20220908-01
HistorySep 08, 2022 - 12:00 a.m.

ROS-20220908-01

2022-09-0800:00:00
redos.red-soft.ru
12

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

79.8%

A vulnerability in the netfilter subsystem of the Linux kernel is related to the use of memory after it has been freed. Exploitation of the vulnerability could allow an attacker to escalate privileges and execute arbitrary code

A vulnerability in the Linux kernel is related to the fact that when called from a non-leading thread, the timer structure remains in the list despite clearing the memory allocated for storage. Exploitation of the vulnerability could allow an attacker to crash or potentially escalate their privileges on the system

A vulnerability in the nft_set_elem_init function of the net/netfilter/nf_tables_api.c file of the User Namespace Handler component of the Linux operating system kernel is caused by a buffer overflow. Exploitation of the vulnerability could allow an attacker acting remotely to gain root access

A vulnerability in the route4_change function (net/sched/cls_route.c) of the Linux kernel is associated with resource management errors. Exploitation of the vulnerability could allow an attacker to crash an application or execute arbitrary code

A vulnerability in the Linux operating system kernel is related to writing outside buffer boundaries in memory. Exploitation of the vulnerability could allow an attacker to execute arbitrary code using the ioctl FBIOPUT_VSCREENINFO system call.

A vulnerability in the nft_set_desc_concat_parse() function of the Linux operating system kernel is related to buffer copying without checking the size of the input data. Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service or execute arbitrary code

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64kernel-lt<= 5.15.35-5UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

79.8%