Lucene search

K
redosRedosROS-20240816-12
HistoryAug 16, 2024 - 12:00 a.m.

ROS-20240816-12

2024-08-1600:00:00
redos.red-soft.ru
26
linux kernel
vulnerability
denial of service
input validation
memory leak
division by zero
null dereferencing
memory usage
remote exploitation
tcp component
nested migration
trusted platform module
bluetooth component
memory boundary
block device driver
network device.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

Vulnerability of setup_dsc_config() function in drivers/gpu/drm/amd/display/dc/dsc/dc_dsc.c module of driver
amdgpu of the Linux operating system kernel is related to a lack of input validation. Exploitation
the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the tcp component of the Linux operating system kernel is related to a division by zero error in the
tcp_rcv_space_adjust(). Exploitation of the vulnerability could allow an attacker acting remotely,
cause a denial of service

A vulnerability in the nested_svm_load_cr3() function in the nSVM component of the Linux kernel is related to
NULL dereferencing during nested migration. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

Vulnerability of tpm2_key_encode() function in security/keys/trusted-keys/trusted_tpm2.c module of subsystem
Trusted Platform Module (TPM) of the Linux operating system kernel is associated with a memory leak. Exploitation
The vulnerability could allow an attacker to cause a denial of service

Vulnerability of speed_show() function in net-sysfs component of Linux kernel is related to
checking for the presence of a network device in speed_show. Exploitation of the vulnerability could allow an attacker to
cause a denial of service

Vulnerability of hci_core() function in Bluetooth component of Linux kernel is related to
lack of memory release sent_cmd before releasing hci_dev. Exploitation of the vulnerability could
allow an attacker to affect the confidentiality, integrity, and availability of protected
information

A vulnerability in the watch_queue_set_filter() function in the watch_queue component of the watch_queue component of the Linux operating system kernel
is related to writing outside of memory boundaries. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

Vulnerability in the pm8001 component of the Linux operating system kernel is related to memory usage after a
release. Exploitation of the vulnerability could allow an attacker to impact the
confidentiality, integrity and availability of protected information

Vulnerability of kdb_read() function in kernel/debug/kdb/kdb_io.c module of Linux kernel is related to
with memory writes outside the allocated buffer. Exploitation of the vulnerability could allow an attacker to
affect confidentiality, integrity and availability of protected information

Vulnerability of iavf_shutdown() function in iavf component of Linux kernel is related to
adding a wait loop to the beginning of iavf_remove() to ensure that port initialization is
is completed before unregistering the network device. Exploitation of the vulnerability could allow an attacker to
cause a denial of service

A vulnerability in the iommu component of the Linux operating system kernel is related to memory usage after a
release. Exploitation of the vulnerability could allow an attacker to impact the
confidentiality, integrity and availability of protected information

Vulnerability of the raid5d() function in the drivers/md/raid5.c module of the block device driver of the Linux kernel is related to an infinite loop of memory after it has been freed.
Linux kernel driver module is related to an infinite resource waiting cycle. Exploitation of the vulnerability could allow
an attacker to cause a denial of service

Vulnerability of port100_send_complete() function in NFC component of Linux kernel is related to memory usage after release.
memory usage after release. Exploitation of the vulnerability could allow an attacker to cause a denial of service
affect confidentiality, integrity and availability of protected information

Vulnerability of_find_compatible_node() function in ethtool component of Linux kernel is related to the failure to free memory after release.
is related to the lack of memory release after an effective lifetime. Exploitation of the vulnerability could
allow an attacker to affect the confidentiality, integrity, and availability of protected information.
information

A vulnerability in the __fib6_rule_action() function in module net/ipv6/fib6_rules.c of the IPv6 protocol implementation of the kernel of the
of Linux operating system is related to dereferencing of a null pointer. Exploitation of the vulnerability could
allow an attacker acting remotely to cause a denial of service

A vulnerability in the may_update_sockmap() function in the kernel/bpf/verifier.c module of the BPF subsystem of the Linux kernel is related to insufficient verification of the null pointer.
Linux kernel is related to insufficient authorization checking. Exploitation of the vulnerability could allow
an intruder to affect the integrity of protected information

Vulnerability in the ipv6 component of the Linux operating system kernel is related to the lack of memory release
after an effective lifetime. Exploitation of the vulnerability could allow an attacker to affect
confidentiality, integrity and availability of protected information

Vulnerability in the amdgpu component of the Linux operating system kernel is related to buffer copying without checking the
the size of the input data. Exploitation of the vulnerability could allow an attacker to cause a denial of service

Vulnerability of gss_read_proxy_verf() function in net/sunrpc/auth_gss/svcauth_gss.c module of protocol implementation
Remote Procedure Call (RPC) protocol implementation of the Linux kernel is related to insufficient memory allocation for the operation.
for the operation. Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the scp_ipi_init() function in the drivers/remoteproc/mtk_scp.c module of the kernel coprocessor driver of the
of the Linux operating system is related to memory writes outside the allocated buffer. Exploitation
of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the blkcg_init_queue() function of the Linux operating system kernel is related to a failure to free
memory after an effective lifetime. Exploitation of the vulnerability could allow an attacker to cause a denial of service.
affect confidentiality, integrity and availability of protected information

Vulnerability in the drm/amd/display component of the Linux kernel is related to the dereferencing of the pointer
NULL. Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the crypto component of the Linux operating system kernel is related to the failure to free memory
after an effective lifetime. Exploitation of the vulnerability could allow an attacker to impact
confidentiality, integrity and availability of protected information

Vulnerability of netif_rx_ni() function in gdm724x component of Linux kernel is related to memory usage after release.
memory usage after release. Exploitation of the vulnerability could allow an attacker to cause
affect confidentiality, integrity and availability of protected information

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64kernel-lt< 6.1.94-1UNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High