Page 475 of 2403 results (0.027 seconds)

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service. Se encontró una condición de ejecución en la red/bluetooth del kernel de Linux en la función {conn,adv}_{min,max}_interval_set(). Esto puede provocar una conexión I2cap o un problema de anomalía en la transmisión, lo que posiblemente provoque una denegación de servicio. A race condition flaw was found in the Linux kernel's net/bluetooth, specifically in the {conn,adv}_{min,max}_interval_set() function, which may disrupt I2cap connections, possibly causing a denial of service. • https://bugzilla.openanolis.cn/show_bug.cgi?id=8154 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html https://access.redhat.com/security/cve/CVE-2024-24858 https://bugzilla.redhat.com/show_bug.cgi?id=2266249 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 4.8EPSS: 0%CPEs: 3EXPL: 0

A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service. Se encontró una condición de ejecución en la red/bluetooth del kernel de Linux en la función sniff_{min,max}_interval_set(). Esto puede provocar un problema de excepción de rastreo de Bluetooth, lo que posiblemente provoque una denegación de servicio. A race condition vulnerability was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. • https://bugzilla.openanolis.cn/show_bug.cgi?id=8153 https://access.redhat.com/security/cve/CVE-2024-24859 https://bugzilla.redhat.com/show_bug.cgi?id=2298817 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. Se encontró una condición de ejecución en el controlador del dispositivo Bluetooth del kernel de Linux en la función {min,max}_key_size_set(). Esto puede provocar un problema de desreferencia de puntero nulo, lo que posiblemente provoque un pánico en el kernel o un problema de denegación de servicio. • https://bugzilla.openanolis.cn/show_bug.cgi?id=8151 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-476: NULL Pointer Dereference •

CVSS: 6.3EPSS: 0%CPEs: 4EXPL: 0

A race condition was found in the Linux kernel's media/xc4000 device driver in xc4000 xc4000_get_frequency() function. This can result in return value overflow issue, possibly leading to malfunction or denial of service issue. Se encontró una condición de ejecución en el controlador de dispositivo media/xc4000 del kernel de Linux en la función xc4000 xc4000_get_frequency(). Esto puede provocar un problema de desbordamiento del valor de retorno, lo que posiblemente provoque un mal funcionamiento o un problema de denegación de servicio. • https://bugzilla.openanolis.cn/show_bug.cgi?id=8150 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 10

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. Una vulnerabilidad de use after free en el componente netfilter: nf_tables del kernel de Linux puede explotarse para lograr una escalada de privilegios local. La función nft_verdict_init() permite valores positivos como error de eliminación dentro del veredicto del gancho y, por lo tanto, la función nf_hook_slow() puede causar una vulnerabilidad double free cuando NF_DROP se emite con un error de eliminación similar a NF_ACCEPT. Recomendamos actualizar después del compromiso f342de4e2f33e0e39165d8639387aa6c19dff660. A flaw was found in the Netfilter subsystem in the Linux kernel. • https://github.com/Notselwyn/CVE-2024-1086 https://github.com/feely666/CVE-2024-1086 https://github.com/CCIEVoice2009/CVE-2024-1086 https://github.com/pl0xe/CVE-2024-1086 https://github.com/xzx482/CVE-2024-1086 https://github.com/kevcooper/CVE-2024-1086-checker https://github.com/matrixvk/CVE-2024-1086-aarch64 http://www.openwall.com/lists/oss-security/2024/04/10/22 http://www.openwall.com/lists/oss-security/2024/04/10/23 http://www.openwall.com/lists/oss& • CWE-416: Use After Free •