Lucene search

K
redosRedosROS-20230905-01
HistorySep 04, 2023 - 12:00 a.m.

ROS-20230905-01

2023-09-0400:00:00
redos.red-soft.ru
23
linux kernel
bluetooth
ksmbd module
perf utility
io_uring subsystem
bq24190 charger
tca_qfq_lmax
remote attacker
arbitrary commands
privileges escalation
denial of service
synchronization errors
authentication flaws
brute force attack

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.2 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.0%

A vulnerability in the Bluetooth permission verification subsystem of the Linux kernel is associated with errors
in the processing of input data. Exploitation of the vulnerability could allow an attacker acting remotely to
execute arbitrary commands by sending specially crafted requests

Vulnerability of the ksmbd module of the Linux kernel is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker acting remotely,
affect the integrity, availability, and confidentiality of protected information and execute
arbitrary code using the SMB2_TREE_DISCONNECT command.

Vulnerability of perf_group_detach() function of perf utility of Linux kernel operating systems is related to
memory usage after its release as a result of pointer dereferencing during event processing.
Exploitation of the vulnerability may allow an attacker to escalate his privileges.

Vulnerability in the ksmbd module of the Linux kernel is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code using the SMB2_QUERY_INFO and SMB2_LOGOFF commands

A vulnerability in the Linux kernel is related to the lack of proper validation of user-supplied data.
Exploitation of the vulnerability could allow an attacker acting remotely to cause reads outside the
outside of the allocated buffer.

A vulnerability in the io_install_fixed_file() function of the io_uring subsystem of the Linux kernel is related to the
memory usage after it has been freed. Exploitation of the vulnerability could allow an attacker to escalate his privileges or cause a denial of service.
privileges or cause a denial of service

A vulnerability in the bq24190_remove() function in the drivers/power/supply/bq24190_charger.c module of the drivers/power/supply/bq24190_charger.c module of the Linux kernel is related to the use of previously freed memory.
Linux kernel is related to the use of previously freed memory due to competitive access to resources
(race condition). Exploitation of the vulnerability could allow an attacker to cause a denial of service.

The vulnerability in the Linux kernel is related to improperly freeing a resource before it becomes available for
reuse. Exploitation of the vulnerability could allow an attacker acting remotely,
to cause a denial of service.

A vulnerability in the ksmbd module of the Linux operating systems kernel is related to flaws in the authentication procedure.
Exploitation of the vulnerability could allow a remote attacker to hijack a valid session

Vulnerability in the ksmbd module of the Linux kernel is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code using the SMB2_SESSION_SETUP command

The vulnerability in the Linux kernel is related to the manipulation of the TCA_QFQ_LMAX argument
with unknown input data. Exploitation of the vulnerability could allow an attacker acting
remotely to cause an entry outside of the acceptable range.

A vulnerability in the ksmbd module of the Linux operating systems kernel is related to flaws in the authentication procedure.
Exploitation of the vulnerability could allow a remote attacker to launch a brute force attack.
"brute force

A vulnerability in the ksmbd module of the Linux kernel is related to incorrect resource release.
Exploitation of the vulnerability could allow a remote attacker to cause a denial of service
using the SMB2_SESSION_SETUP command

Vulnerability in the rcu_barrier() function of the ksmbd module of Linux kernels is related to synchronization errors when using a shared resource.
synchronization errors when using a shared resource. Exploitation of the vulnerability could allow an attacker to
elevate privileges and execute arbitrary code

Vulnerability in ksmbd module of Linux kernel is related to insufficient protection of service data.
Exploitation of the vulnerability could allow a remote intruder to gain unauthorized access to protected information or to cause unauthorized
access to protected information or cause a denial of service using the SMB2_QUERY_INFO and SMB2_LOGOFF commands.
SMB2_LOGOFF

Vulnerability of the ksmbd module of Linux kernel operating systems is related to synchronization errors when using a shared resource.
shared resource utilization. Exploitation of the vulnerability could allow an attacker acting remotely,
execute arbitrary code using the SMB2_LOGOFF and SMB2_CLOSE commands

A vulnerability in the ksmbd module of the Linux kernel is related to pointer dereferencing errors.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
using the SMB2_LOGOFF command.

A vulnerability in the Linux kernel is related to race condition in driver/char/xillybus/xilliusb.c file. Exploitation of the
of the vulnerability could allow an attacker to execute arbitrary code.

A vulnerability in the ksmbd module of the Linux kernel is related to pointer dereferencing errors.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service
by sending a specially crafted request

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64kernel-lt<= 5.15.125-1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.2 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

73.0%