CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
Vulnerability of the do_vcc_ioctl() function in the net/atm/ioctl.c module of the ATM (Asynchronous Transfer Mode) network protocol implementation of the Linux kernel is related to the reuse of a previously exploited ATM protocol.
(Asynchronous Transfer Mode) kernel of the Linux operating system is related to the reuse of previously released memory due to competitive resource access (race condition).
of previously freed memory due to competitive access to the resource (race condition). Exploitation of the vulnerability
could allow an attacker to affect the confidentiality, integrity and availability of the protected information
protected information
The vulnerability in the nft_dynset_init() function (net/netfilter/nft_dynset.c) of the Linux operating systems kernel is related to
pointer dereferencing errors. Exploitation of the vulnerability could allow an attacker to cause a denial of
denial of service
A vulnerability in the nft_pipapo_walk() function in the net/netfilter/nft_set_pipapo.c module of the Netfilter subsystem of the Netfilter kernel of the
of Linux operating system is related to memory usage after its release. Exploitation
of the vulnerability could allow an intruder acting remotely to impact the confidentiality,
integrity and availability of protected information and increase their privileges on the system
The vulnerability of the nvmet_tcp_free_crypto function of the drivers/nvme/target/tcp.c file of the NVMe-oF/TCP subsystem of the kernel of Linux operating systems is related to the possibility to exploit the vulnerability of the drivers/nvme/target/tcp.c file.
of Linux operating systems is related to the possibility of memory usage after freeing. Exploitation
the vulnerability could allow a remote attacker to escalate privileges or execute arbitrary code.
arbitrary code
Vulnerability in AMD KVM subsystem to support nested SVM virtualization of Linux operating system kernels
is related to improper handling of nested shutdown execution. Exploitation of the vulnerability could
allow an attacker to cause a denial of service
A vulnerability in the __perf_read_group_add() function of the kernel/events/core.c module of a Linux operating system kernel
is related to writing outside the allocated buffer. Exploitation of the vulnerability could allow an attacker to
to affect the confidentiality, integrity, and availability of protected information, or to elevate
privileges
Vulnerability of atalk_ioctl() function in net/appletalk/ddp.c module of the Appletalk protocol implementation in the kernel of the
Linux operating system kernel is related to reuse of previously freed memory due to competitive access to the resource (state of the resource).
competitive access to a resource (race condition). Exploitation of the vulnerability could allow an attacker to
affect confidentiality, integrity and availability of protected information
Vulnerability of setup_async_work() function (fs/ksmbd/smb2pdu.c) to the SMB subsystem of the operating system kernel of
Linux is related to the use of memory after it has been freed. Exploitation of the vulnerability could allow
an attacker to cause a denial of service
Vulnerability of rose_ioctl() function in net/rose/af_rose.c module of Amateur Radio X.25 PLP protocol implementation
(Rose) of the Linux kernel is related to the reuse of previously freed memory
due to competitive access to the resource (race condition). Exploitation of the vulnerability could allow
an intruder to affect confidentiality, integrity and availability of protected information
A vulnerability in the igb_set_rx_buffer_len() function in the drivers/net/ethernet/intel/igb/igb_main.c module of the kernel of the
of the Linux kernel is related to a buffer overrun. Exploitation of the vulnerability
could allow an attacker acting remotely to affect the confidentiality,
integrity and availability of protected information
Vulnerability of the rsvp_change() function in the net/sched/cls_rsvp.h module of the net/shed component of the net/shed kernel of the Linux operating system is related to a buffer overrun.
Linux kernel is related to memory overrun. Exploitation of the vulnerability could allow
an attacker to cause a denial of service
A vulnerability in the bt_sock_recvmsg() function in the net/bluetooth/af_bluetooth.c module of the Bluetooth driver of the net/bluetooth kernel of the
of the Linux operating system is related to the reuse of previously freed memory due to competitive access to the resource (state of the resource).
Competitive access to a resource (race condition).Exploitation of the vulnerability could allow an attacker to
impact the confidentiality, integrity and availability of protected information
A vulnerability in the smb2_is_status_io_timeout() function of the SMB component of the Linux operating system kernel is related to the
memory usage after it has been freed. Exploitation of the vulnerability could allow an attacker to cause a
denial of service
A vulnerability in the qfq_dequeue() function in the net/sched/sch_plug.c module of a Linux kernel is related to the use of previously freed memory.
the use of previously freed memory. Exploitation of the vulnerability could allow an attacker to cause
confidentiality, integrity, and availability of protected information, or to increase their
privileges
A vulnerability in the scatterwalk_copychunks() function in the net/tls/tls_sw.c module of the cryptographic subsystem of the kernel of the
of the Linux operating system kernel cryptographic subsystem is related to null pointer dereferencing. Exploitation of the vulnerability could
allow an attacker to cause a denial of service or escalate privileges