Lucene search

K
redosRedosROS-20240905-04
HistorySep 05, 2024 - 12:00 a.m.

ROS-20240905-04

2024-09-0500:00:00
redos.red-soft.ru
2
linux kernel
memory access
null pointer
denial of service
confidentiality
integrity
availability

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

Low

Vulnerability of the do_setvfinfo() function in the net/core/rtnetlink.c module of the TCP/IP protocol stack implementation of the Linux kernel
of Linux operating system is related to reading memory outside the allocated buffer. Exploitation
exploitation of the vulnerability may allow an intruder to affect confidentiality, integrity and availability of protected information.
availability of protected information

Vulnerability of malidp_mw_connector_reset() function in drivers/gpu/drm/arm/malidp_mw.c module of ARM Driver
Mali Display Processor of the Linux operating system kernel is related to null pointer dereferencing.
Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the idxd component of the Linux operating system kernel is related to a failure during workqueue enablement.
Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the queue_oob() function in the net/unix/af_unix.c module of the AF_UNIX sockets implementation of the AF_UNIX kernel of a Linux operating system is associated with a vulnerability in the reuse of previously used workqueue.
Linux kernel is related to the reuse of previously freed memory due to competitive access to a resource (race condition).
to a resource (race condition). Exploitation of the vulnerability could allow an attacker to cause a denial of
denial of service

A vulnerability in the tcp_twsk_unique() function in the net/ipv4/tcp_ipv4.c module of the IPv4 protocol implementation of the kernel of the
of the Linux operating system is related to the reuse of previously freed memory due to the
competitive access to a resource (race condition). Exploitation of the vulnerability could allow an attacker to
affect confidentiality, integrity and availability of protected information

A vulnerability in the net_alloc_generic() function in the net/core/net_namespace.c module of the Linux operating system kernel
is related to memory access outside the allocated buffer. Exploitation of the vulnerability could allow
an intruder to affect confidentiality, integrity and availability of protected information

Vulnerability of the ssh_css component of the Linux operating system kernel is related to dereferencing of a null pointer in load_video_vss.
pointer in load_video_binaries. Exploitation of the vulnerability could allow an attacker to cause a denial of
denial of service

Vulnerability in Linux kernel component vc4 is related to null pointer dereferencing in the
vc4_hdmi_audio_init(). Exploitation of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the ieee80211_tx_ba_session_handle_start() function in the mac80211 component of the mac80211 kernel of the Linux operating system is related to receiving a NULL pointer.
Linux kernel is related to receiving NULL for sdata when deauthentication is performed. Exploitation of the
of the vulnerability could allow an attacker to cause a denial of service

A vulnerability in the register_device() function in the drivers/char/ppdev.c module of the symbolic device driver of the kernel
of the Linux operating system is related to memory accesses outside the allocated buffer. Exploitation
of the vulnerability may allow an intruder to affect confidentiality, integrity and availability of protected information.
availability of protected information

A vulnerability in the net/mlx5 component of the Linux operating system kernel is related to command termination cancelation in case of an internal error after memory freeing.
internal error after memory freeing. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

Vulnerability in the thermal/drivers/tsens component of the Linux kernel is related to an error in dereferencing a null pointer.
null pointer dereference error compute_intercept_slope(), which is called from calibrate_8960().
Exploitation of the vulnerability could allow an attacker to cause a denial of service

Vulnerability in the drm/amd/display component of the Linux operating system kernel is related to the ‘i’ index going outside the
out of bounds in the transfer function (TRANSFER_FUNC_POINTS). Exploitation of the vulnerability could allow
an attacker to cause a denial of service

Vulnerability in the tipc_buf_append() function in the net/tipc/msg.c module of the Transparent Inter
Process Communication (TIPC) implementation of the Linux kernel is related to the reuse of previously freed memory.
of previously freed memory. Exploitation of the vulnerability could allow an attacker to impact the
confidentiality, integrity and availability of protected information

Vulnerability of sk_psock_verdict_data_ready() function in net/core/skmsg.c module of Linux operating system kernel is related to dereferencing of null memory.
Linux is related to null pointer dereferencing. Exploitation of the vulnerability could allow an attacker to
cause a denial of service

Vulnerability of tpm2_key_encode() function in module security/keys/trusted-keys/trusted_tpm2.c of subsystem
Trusted Platform Module (TPM) of the Linux operating system kernel is related to incorrect processing of the code of the
of the asn1_encode_sequence() function return code. Exploitation of the vulnerability could allow an attacker to cause a
denial of service

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64kernel-lt< 6.1.94-1UNKNOWN

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

Low