8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.2 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:S/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
73.0%
A vulnerability in the Bluetooth permission verification subsystem of the Linux kernel is associated with errors
in the processing of input data. Exploitation of the vulnerability could allow an attacker acting remotely to
execute arbitrary commands by sending specially crafted requests
Vulnerability of the ksmbd module of the Linux kernel is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker acting remotely,
affect the integrity, availability, and confidentiality of protected information and execute
arbitrary code using the SMB2_TREE_DISCONNECT command.
Vulnerability of perf_group_detach() function of perf utility of Linux kernel operating systems is related to
memory usage after its release as a result of pointer dereferencing during event processing.
Exploitation of the vulnerability may allow an attacker to escalate his privileges.
Vulnerability in the ksmbd module of the Linux kernel is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code using the SMB2_QUERY_INFO and SMB2_LOGOFF commands
A vulnerability in the Linux kernel is related to the lack of proper validation of user-supplied data.
Exploitation of the vulnerability could allow an attacker acting remotely to cause reads outside the
outside of the allocated buffer.
A vulnerability in the io_install_fixed_file() function of the io_uring subsystem of the Linux kernel is related to the
memory usage after it has been freed. Exploitation of the vulnerability could allow an attacker to escalate his privileges or cause a denial of service.
privileges or cause a denial of service
A vulnerability in the bq24190_remove() function in the drivers/power/supply/bq24190_charger.c module of the drivers/power/supply/bq24190_charger.c module of the Linux kernel is related to the use of previously freed memory.
Linux kernel is related to the use of previously freed memory due to competitive access to resources
(race condition). Exploitation of the vulnerability could allow an attacker to cause a denial of service.
The vulnerability in the Linux kernel is related to improperly freeing a resource before it becomes available for
reuse. Exploitation of the vulnerability could allow an attacker acting remotely,
to cause a denial of service.
A vulnerability in the ksmbd module of the Linux operating systems kernel is related to flaws in the authentication procedure.
Exploitation of the vulnerability could allow a remote attacker to hijack a valid session
Vulnerability in the ksmbd module of the Linux kernel is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code using the SMB2_SESSION_SETUP command
The vulnerability in the Linux kernel is related to the manipulation of the TCA_QFQ_LMAX argument
with unknown input data. Exploitation of the vulnerability could allow an attacker acting
remotely to cause an entry outside of the acceptable range.
A vulnerability in the ksmbd module of the Linux operating systems kernel is related to flaws in the authentication procedure.
Exploitation of the vulnerability could allow a remote attacker to launch a brute force attack.
"brute force
A vulnerability in the ksmbd module of the Linux kernel is related to incorrect resource release.
Exploitation of the vulnerability could allow a remote attacker to cause a denial of service
using the SMB2_SESSION_SETUP command
Vulnerability in the rcu_barrier() function of the ksmbd module of Linux kernels is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker to
elevate privileges and execute arbitrary code
Vulnerability in ksmbd module of Linux kernel is related to insufficient protection of service data.
Exploitation of the vulnerability could allow a remote intruder to gain unauthorized access to protected information or to cause unauthorized
access to protected information or cause a denial of service using the SMB2_QUERY_INFO and SMB2_LOGOFF commands.
SMB2_LOGOFF
Vulnerability of the ksmbd module of Linux kernel operating systems is related to synchronization errors when using a shared resource.
shared resource utilization. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code using the SMB2_LOGOFF and SMB2_CLOSE commands
A vulnerability in the ksmbd module of the Linux kernel is related to pointer dereferencing errors.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
using the SMB2_LOGOFF command.
A vulnerability in the Linux kernel is related to race condition in driver/char/xillybus/xilliusb.c file. Exploitation of the
of the vulnerability could allow an attacker to execute arbitrary code.
A vulnerability in the ksmbd module of the Linux kernel is related to pointer dereferencing errors.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
by sending a specially crafted request
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.2 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:S/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
73.0%