A vulnerability was found in Linux Kernel up to 6.15.3 and classified as critical. The affected element is the function kmem_cache_create of the component SCI Handler. Executing manipulation can lead to memory leak.
This vulnerability is registered as CVE-2025-38344. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.6.94/6.12.34/6.15.3. Impacted is an unknown function of the component wifi. Such manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2025-38343. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.15.3. This issue affects the function software_node_get_reference_args. This manipulation causes out-of-bounds read.
The identification of this vulnerability is CVE-2025-38342. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.15.3 and classified as problematic. This affects the function arch_bpf_trampoline_size. The manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2025-38339. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.15.3. It has been rated as critical. This impacts the function cs_dsp_mock_bin_add_name_or_info of the component firmware. This manipulation causes allocation of resources.
This vulnerability appears as CVE-2025-38340. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.12.34/6.15.3/6.16-rc2. This affects the function fbnic_mbx_map_msg of the component eth. The manipulation leads to double free.
This vulnerability is uniquely identified as CVE-2025-38341. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.16-rc2. This vulnerability affects the function pata_via of the component ata. The manipulation results in denial of service.
This vulnerability was named CVE-2025-38336. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.6.94/6.12.34/6.15.3. Affected is the function nfs_return_empty_folio. Such manipulation leads to deadlock.
This vulnerability is traded as CVE-2025-38338. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.3. It has been declared as critical. This affects the function jbd2_journal_dirty_metadata of the component jbd2. The manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2025-38337. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.1.141/6.6.94/6.12.34/6.15.3. Affected by this vulnerability is the function arch_memory_failure of the component SGX Page. Performing manipulation results in state issue.
This vulnerability is known as CVE-2025-38334. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.15.3. Affected by this issue is the function gpio_keys_irq_timer of the file kernel/locking/spinlock_rt.c. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2025-38335. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability has been found in Adobe Dimension up to 3.4.7 and classified as critical. Affected by this issue is some unknown functionality. This manipulation causes heap-based buffer overflow.
The identification of this vulnerability is CVE-2023-25882. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Adobe Dimension up to 3.4.7 and classified as critical. This affects an unknown part. Such manipulation leads to heap-based buffer overflow.
This vulnerability is referenced as CVE-2023-25883. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Adobe Dimension up to 3.4.7. This impacts an unknown function. Executing manipulation can lead to improper input validation.
This vulnerability is handled as CVE-2023-25879. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Adobe Dimension up to 3.4.7. Affected is an unknown function. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2023-25880. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Adobe Dimension up to 3.4.7. Affected by this vulnerability is an unknown functionality. The manipulation results in improper input validation.
This vulnerability was named CVE-2023-25881. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.3. It has been declared as critical. Impacted is the function jffs2_prealloc_raw_node_refs of the component jffs2. Executing manipulation can lead to null pointer dereference.
This vulnerability appears as CVE-2025-38328. The attacker needs to be present on the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.15.3 and classified as critical. This affects the function cs_dsp_ctl_cache_init_multiple_offsets of the component firmware. This manipulation causes allocation of resources.
This vulnerability is registered as CVE-2025-38330. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.15.3. It has been rated as critical. The affected element is the function memcpy of the component scsi. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2025-38332. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is advised.