Lucene search

K
redosRedosROS-20240812-16
HistoryAug 12, 2024 - 12:00 a.m.

ROS-20240812-16

2024-08-1200:00:00
redos.red-soft.ru
8
linux kernel
netfilter
nvme-of
amd kvm
appletalk
smb
rose
intel igb
memory reuse
race condition
denial of service
privilege escalation
arbitrary code
buffer overrun
nested svm
confidential information

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

Vulnerability of the do_vcc_ioctl() function in the net/atm/ioctl.c module of the ATM (Asynchronous Transfer Mode) network protocol implementation of the Linux kernel is related to the reuse of a previously exploited ATM protocol.
(Asynchronous Transfer Mode) kernel of the Linux operating system is related to the reuse of previously released memory due to competitive resource access (race condition).
of previously freed memory due to competitive access to the resource (race condition). Exploitation of the vulnerability
could allow an attacker to affect the confidentiality, integrity and availability of the protected information
protected information

The vulnerability in the nft_dynset_init() function (net/netfilter/nft_dynset.c) of the Linux operating systems kernel is related to
pointer dereferencing errors. Exploitation of the vulnerability could allow an attacker to cause a denial of
denial of service

A vulnerability in the nft_pipapo_walk() function in the net/netfilter/nft_set_pipapo.c module of the Netfilter subsystem of the Netfilter kernel of the
of Linux operating system is related to memory usage after its release. Exploitation
of the vulnerability could allow an intruder acting remotely to impact the confidentiality,
integrity and availability of protected information and increase their privileges on the system

The vulnerability of the nvmet_tcp_free_crypto function of the drivers/nvme/target/tcp.c file of the NVMe-oF/TCP subsystem of the kernel of Linux operating systems is related to the possibility to exploit the vulnerability of the drivers/nvme/target/tcp.c file.
of Linux operating systems is related to the possibility of memory usage after freeing. Exploitation
the vulnerability could allow a remote attacker to escalate privileges or execute arbitrary code.
arbitrary code

Vulnerability in AMD KVM subsystem to support nested SVM virtualization of Linux operating system kernels
is related to improper handling of nested shutdown execution. Exploitation of the vulnerability could
allow an attacker to cause a denial of service

A vulnerability in the __perf_read_group_add() function of the kernel/events/core.c module of a Linux operating system kernel
is related to writing outside the allocated buffer. Exploitation of the vulnerability could allow an attacker to
to affect the confidentiality, integrity, and availability of protected information, or to elevate
privileges

Vulnerability of atalk_ioctl() function in net/appletalk/ddp.c module of the Appletalk protocol implementation in the kernel of the
Linux operating system kernel is related to reuse of previously freed memory due to competitive access to the resource (state of the resource).
competitive access to a resource (race condition). Exploitation of the vulnerability could allow an attacker to
affect confidentiality, integrity and availability of protected information

Vulnerability of setup_async_work() function (fs/ksmbd/smb2pdu.c) to the SMB subsystem of the operating system kernel of
Linux is related to the use of memory after it has been freed. Exploitation of the vulnerability could allow
an attacker to cause a denial of service

Vulnerability of rose_ioctl() function in net/rose/af_rose.c module of Amateur Radio X.25 PLP protocol implementation
(Rose) of the Linux kernel is related to the reuse of previously freed memory
due to competitive access to the resource (race condition). Exploitation of the vulnerability could allow
an intruder to affect confidentiality, integrity and availability of protected information

A vulnerability in the igb_set_rx_buffer_len() function in the drivers/net/ethernet/intel/igb/igb_main.c module of the kernel of the
of the Linux kernel is related to a buffer overrun. Exploitation of the vulnerability
could allow an attacker acting remotely to affect the confidentiality,
integrity and availability of protected information

Vulnerability of the rsvp_change() function in the net/sched/cls_rsvp.h module of the net/shed component of the net/shed kernel of the Linux operating system is related to a buffer overrun.
Linux kernel is related to memory overrun. Exploitation of the vulnerability could allow
an attacker to cause a denial of service

A vulnerability in the bt_sock_recvmsg() function in the net/bluetooth/af_bluetooth.c module of the Bluetooth driver of the net/bluetooth kernel of the
of the Linux operating system is related to the reuse of previously freed memory due to competitive access to the resource (state of the resource).
Competitive access to a resource (race condition).Exploitation of the vulnerability could allow an attacker to
impact the confidentiality, integrity and availability of protected information

A vulnerability in the smb2_is_status_io_timeout() function of the SMB component of the Linux operating system kernel is related to the
memory usage after it has been freed. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

A vulnerability in the qfq_dequeue() function in the net/sched/sch_plug.c module of a Linux kernel is related to the use of previously freed memory.
the use of previously freed memory. Exploitation of the vulnerability could allow an attacker to cause
confidentiality, integrity, and availability of protected information, or to increase their
privileges

A vulnerability in the scatterwalk_copychunks() function in the net/tls/tls_sw.c module of the cryptographic subsystem of the kernel of the
of the Linux operating system kernel cryptographic subsystem is related to null pointer dereferencing. Exploitation of the vulnerability could
allow an attacker to cause a denial of service or escalate privileges

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64kernel-lt< 6.1.94-1UNKNOWN

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High