Lucene search

K
redosRedosROS-20221220-01
HistoryDec 20, 2022 - 12:00 a.m.

ROS-20221220-01

2022-12-2000:00:00
redos.red-soft.ru
30

8.8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.5%

A vulnerability in the ath9k_htc_wait_for_target function of the Atheros wireless adapter driver of the kernel of the operating system
Linux kernel is associated with a post-release usage error. Exploitation of the vulnerability could
allow an attacker to access kernel memory by typing a specially crafted message,
which could lead to a system crash or leak internal kernel information

Vulnerability of the BPF_BTF_LOAD() function of the eBPF subsystem of the kernel of Linux operating systems is related to an out-of-bounds
operation beyond the buffer boundaries in memory. Exploitation of the vulnerability could allow an attacker to escalate his or her privileges or cause a denial of service.
privileges or cause a denial of service

Vulnerability of roccat_report_event function (drivers/hid/hid-roccat.c) of Linux kernel is related to
with memory usage after it has been freed. Exploitation of the vulnerability could allow an attacker to
cause a denial of service

A vulnerability in the Linux operating systems kernel is related to the jlink_init function of the monitor/jlink.c file of component
BlueZ. Exploitation of the vulnerability could allow an attacker to cause a denial of service.

A vulnerability in the drivers/firmware/efi/capsule-loader.c component of the Linux operating system kernel is related to the
memory usage after memory is freed. Exploitation of the vulnerability could allow an attacker,
acting remotely to escalate privileges or cause a denial of service

A vulnerability in the Linux operating system kernel is related to the race condition in the kcm_tx_work function of the file
net/kcm/kcmsock.c of the kcm component. Exploitation of the vulnerability could allow an attacker, to gain access to the
information

A vulnerability in the Lockdown Mode implementation of the Linux kernel is related to
insecure privilege management when loading KGDB and KDB debugging tools. Exploitation of the vulnerability
could allow an attacker to bypass security restrictions

Vulnerability of the sys_perf_event_open() function of the perf subsystem of the Linux operating system kernel is caused by a
by a race condition in this subsystem, which can be used to initiate a call to an already
kernel memory area that has already been freed. Exploitation of the vulnerability allows a local attacker to gain
root privileges

The vulnerability is related to an out-of-memory write error in the kernel’s UDF file system functionality
Linux when initializing some file operations that trigger udf_write_fi(). Exploitation
of the vulnerability could allow an attacker to cause a denial-of-service attack

A vulnerability in the Linux operating systems kernel is related to a race condition when ejecting a USB device during a
open() call. Exploitation of the vulnerability could allow an attacker to cause a denial of service attack.

A vulnerability in the xfrm_expand_policies (net/xfrm/xfrm_policy.c) function of the Linux operating system kernel is related to
with resource release errors. Exploiting the vulnerability allows an attacker acting remotely to cause a denial of service.
remotely to cause a denial of service

Vulnerability of asynchronous I/O interface io_uring of Linux kernel is related to
The ability to use memory after it has been freed. Exploitation of the vulnerability could allow an attacker to
escalate privileges

Vulnerability of the pxa3xx_gcu_write (drivers/video/fbdev/pxa3xx-gcu.c) function of the Linux operating system kernel
is caused by an integer overflow. Exploiting the vulnerability could allow an attacker acting remotely to execute arbitrary code.
remotely to execute arbitrary code

A vulnerability in the fs/io_uring.c component of the Linux kernel is related to pointer dereferencing errors.
pointer dereferencing errors. Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the Linux kernel is related to the use of a buffer after the release of the queueing function
to the sch_sfb socket buffer (SKB) queue. Exploitation of the vulnerability could allow an attacker to cause a denial of
denial of service

Linux kernel vulnerability is related to a memory leak in intr_callback file
drivers/net/usb/r8152.c of the BPF component. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

A vulnerability in the Linux operating systems kernel is associated with the fib_nh_match function of the net/ipv4/fib_semantics.c file
of the IPv4 Handler component. Exploitation of the vulnerability could allow an attacker to cause a denial of
denial of service

A vulnerability in the Linux operating systems kernel is related to a race condition when a PCMCIA device is removed during a
open() call. Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the nfnetlink_queue module of the Linux operating systems kernel is related to incorrect processing of
verdicts with the one-byte attribute nfta_payload. Exploitation of the vulnerability could allow an attacker,
acting remotely, to cause a denial of service

A vulnerability in the link counting functionality of the BSS (Basic Service Set) mode of Linux kernel operating systems
is related to the possibility of memory usage after freeing. Exploitation of the vulnerability could allow
an attacker acting remotely to execute arbitrary code

The stex_queuecommand_lck() vulnerability in the stex_queuecommand_lck() function of the Linux kernel is related to disclosure of information in an erroneous data area.
information in the wrong data area. Exploitation of the vulnerability could allow an attacker to gain
unauthorized access to protected information

Vulnerability in Linux kernel is related to the possibility of using memory after release
in MBSSID parsing code. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code

A vulnerability in the Linux operating systems kernel is related to the drivers/usb/mon/mon_bin.c driver in usbmon.
Exploitation of the vulnerability could allow an attacker to corrupt internal memory

A vulnerability in the Linux operating systems kernel is related to the race condition when deleting a PCMCIA device during a
ioctl call. Exploitation of the vulnerability could allow an attacker to cause a denial of service

Vulnerability in the cfg80211_update_notlisted_nontrans function of the net/wireless/scan.c file of the kernel of operating systems
Linux is related to a buffer overflow. Exploitation of the vulnerability could allow an attacker acting
remotely to execute arbitrary code

A vulnerability in the Linux operating systems kernel is related to the ability to inject WLAN frames into the mac80211 stack.
Exploitation of the vulnerability could allow a remote attacker to cause a denial-of-service attack.
denial of service"

The vulnerability in the Linux operating systems kernel is related to how it handled the case of the
I2C_SMBUS_BLOCK_PROC_CALL (via the I2C_SMBUS ioctl) with malicious input data. Exploitation of the
of the vulnerability could allow an attacker to cause a system crash

Vulnerability in the Linux kernel is related to reading outside of memory when calling the function
bpf_tail_call function with a key greater than max_entries. Exploitation of the vulnerability could allow an attacker to,
gain unauthorized access to data

Vulnerability in the u32_change() reference counter function in the net/sched component of the Linux kernel
is related to errors in updating the reference counter. Exploitation of the vulnerability could allow an attacker to
elevate privileges to root

Vulnerability of the clear_bss function of Linux kernels is related to errors in clearing the initial character of a block (.bss).
block character (.bss). Exploitation of the vulnerability could allow an attacker to execute arbitrary code

Vulnerability in Linux kernel is related to race condition in watch queue due to
lack of blocking in pipe_resize_ring(). Exploitation of the vulnerability could allow an attacker to,
use improper locking when performing operations on an object and cause a system crash, or
elevate their privileges on the system

A vulnerability in the reserve_sfa_size() function of the openvswitch module of the Linux operating system kernel is related to
writing beyond buffer boundaries in memory. Exploitation of the vulnerability could allow an attacker to escalate their
privileges or cause an octhasis in service

A vulnerability in the ismt_access() function of the i2c-ismt driver of the i2c-ismt kernel of Linux operating systems is related to an incorrect
buffer size calculation during I2C_SMBUS_BLOCK_DATA data block write processing. Exploitation
of the vulnerability may allow an attacker to cause a denial of service using the ioctl system call
I2C_SMBUS

A vulnerability in the rpmsg_virtio_add_ctrl_dev function (drivers/rpmsg/virtio_rpmsg_bus.c) of the kernel of the Linux operating system
of the Linux operating system kernel is related to memory re-release. Exploitation of the vulnerability could allow
an attacker to cause a denial of service

A vulnerability in the Linux operating system kernel is related to null pointer dereferencing in the function
find_prog_by_sec_insn of the tools/lib/bpf/libbpf.c file of the BPF component. Exploitation of the vulnerability could
allow an attacker to cause a denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64kernel-lt<= 5.15.78-1UNKNOWN

8.8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.009 Low

EPSS

Percentile

82.5%