A vulnerability was found in Linux Kernel up to 6.12.43/6.16.3. It has been declared as critical. This vulnerability affects the function dc_destruct of the component AMD Display Driver. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-39705. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.17-rc2 and classified as critical. This affects an unknown part of the component iio. The manipulation results in buffer overflow.
This vulnerability is identified as CVE-2025-39687. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.43/6.16.3/6.17-rc2. This affects the function io_futex_wait. The manipulation results in allocation of resources.
This vulnerability is reported as CVE-2025-39698. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.16.3. This affects an unknown part of the component media. Executing manipulation can lead to out-of-bounds read.
This vulnerability appears as CVE-2025-39710. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.16.3 and classified as critical. Affected is the function serial8250_do_startup. Executing manipulation can lead to buffer overflow.
This vulnerability appears as CVE-2025-39724. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.6.100/6.12.40/6.15.8. It has been declared as critical. This affects the function ism_cmd. This manipulation causes state issue.
This vulnerability is handled as CVE-2025-39726. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.6.102/6.12.43/6.16.3. The affected element is the function qat_4xxx. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2025-39721. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability has been found in Linux Kernel up to 6.12.43/6.16.3/6.17-rc2 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to privilege escalation.
This vulnerability is listed as CVE-2025-39695. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3/6.17-rc2. It has been declared as critical. Impacted is the function ksmbd_rdma_stop_listening. Performing manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-39692. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability has been found in Linux Kernel up to 6.1.148/6.6.102/6.12.43/6.16.3/6.17-rc2 and classified as critical. This impacts the function shutdown of the component gve. Executing manipulation can lead to null pointer dereference.
This vulnerability is registered as CVE-2025-38735. The attack requires access to the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.17-rc2. Affected by this vulnerability is the function request_irq. Executing manipulation can lead to out-of-bounds read.
The identification of this vulnerability is CVE-2025-39685. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Google Android 16. The impacted element is an unknown function of the component libxml2. Such manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2025-26434. An attack has to be approached locally. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.17-rc2. This vulnerability affects unknown code in the library include/linux/skbuff.h of the component netfilter. Performing manipulation results in improper update of reference count.
This vulnerability is known as CVE-2025-38732. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.