Lucene search

K
redosRedosROS-20240820-10
HistoryAug 20, 2024 - 12:00 a.m.

ROS-20240820-10

2024-08-2000:00:00
redos.red-soft.ru
9
linux kernel
denial of service
information security
netfilter
data race condition
confidentiality
integrity

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

Vulnerability of the br_nf_local_in() function in the net/bridge/br_netfilter_hooks.c module of the netfilter component of the netfilter kernel of the
of the Linux operating system is related to incorrect packet processing. Exploitation of the vulnerability could
allow an attacker to affect the confidentiality, integrity, and availability of protected information
information

Vulnerability in the tun component of the Linux operating system kernel is related to the receipt of too many
packets, tun_do_read will continue to unload the contents of the packet, when the console is enabled, unloading the
packet will take much more CPU time and a lock will be detected. Exploitation of the
of the vulnerability could allow an attacker to cause a denial of service

Vulnerability in the kfd_ioctl_get_process_apertures_new() function in module
drivers/gpu/drm/amd/amdkfd/kfd_chardev.c of the Linux operating system kernel amdkfd driver is related to an
integer overflow. Exploitation of the vulnerability could allow an attacker to cause a denial of
denial of service

A vulnerability in the xilinx_dpdma component of the xilinx_dpdma component of the Linux operating system kernel is related to improper locking.
Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the __nft_obj_type_get() function in the nf_tables component of the Linux operating system kernel is related to a
A potential data race condition in __nft_obj_type_get() nft_unregister_obj(), due to running
simultaneously with __nft_obj_type_get(). Exploitation of the vulnerability could allow an attacker to have an
Impact the confidentiality, integrity, and availability of protected information

Vulnerability in the i2c_hid_xfer() function in the i2c-hid component of the Linux operating system kernel is related to the invocation of a
interrupt handler in an infinite loop. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

A vulnerability in the batman-adv component of the Linux operating system kernel is associated with infinite loop errors
when attempting to resize a local TT. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

A vulnerability in the nft_expr_type_get() function in the net/netfilter/nf_tables_api.c module of the netfilter component of the netfilter kernel of the
of the Linux operating system is related to competitive access to a resource (race condition). Exploitation
of the vulnerability could allow an attacker to affect the confidentiality, integrity and availability of protected information.
availability of protected information

A vulnerability in the smbus component of the Linux operating system kernel is associated with “OOPS” errors when using the
designware controller as a target object only. Exploitation of the vulnerability could allow
an attacker to cause a denial of service

A vulnerability in the hci_req_sync_complete() function in the Bluetooth component of the Linux operating system kernel
is related to the lack of releasing the previous state of the synchronization request before assigning a reference
to a new one. Exploitation of the vulnerability could allow an attacker to cause a denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64kernel-lt< 6.1.94-1UNKNOWN

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High