CVE-2025-6365
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-06-20
Last updated on: 2025-09-30
Assigner: VulDB
Description
Description
A vulnerability was found in HobbesOSR Kitten up to c4f8b7c3158983d1020af432be1b417b28686736 and classified as critical. Affected by this issue is the function set_pte_at in the library /include/arch-arm64/pgtable.h. The manipulation leads to resource consumption. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hobbesosr | kitten | to 2023-05-18 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-404 | The product does not release or incorrectly releases a resource before it is made available for re-use. |
| CWE-835 | The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. |
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can lead to resource consumption, which may degrade system performance or availability. Since it is classified as critical, it could potentially cause significant disruption depending on the environment where HobbesOSR Kitten is used.
Can you explain this vulnerability to me?
This vulnerability exists in the HobbesOSR Kitten software, specifically in the function set_pte_at within the /include/arch-arm64/pgtable.h library. It allows manipulation that leads to resource consumption, which can be critical.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70