A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.25/6.14.4/6.15-rc3. The affected element is an unknown function of the file vsc-tp.c of the component mei. Performing manipulation of the argument buf[] results in buffer overflow.
This vulnerability is known as CVE-2025-37816. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.25/6.14.4/6.15-rc3. Affected is the function ufshcd_mcq_compl_pending_transfer of the component scsi. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2025-37826. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.25/6.14.4/6.15-rc3. This affects the function typec_partner_unlink_device of the component usb. The manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2025-37809. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.12.25/6.14.4/6.15-rc3/e91dab550dd1d2221333cac9f5c012ab5193696f. It has been declared as critical. This vulnerability affects the function __btrfs_add_free_space_zoned of the component btrfs. The manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2025-37827. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.135/6.6.88/6.12.25/6.14.4/6.15-rc3 and classified as critical. Affected by this issue is the function generic_handle_irq of the component pci1xxxx. Executing manipulation can lead to denial of service.
This vulnerability is registered as CVE-2025-37815. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15-rc3. It has been rated as critical. This issue affects some unknown processing of the component ci_hdrc_imx. This manipulation causes null pointer dereference.
This vulnerability appears as CVE-2025-37811. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.135/6.6.88/6.12.25/6.14.4/6.15-rc3. The impacted element is the function xdp_convert_buff_to_frame of the component xen-netfront. Executing manipulation can lead to null pointer dereference.
This vulnerability is handled as CVE-2025-37820. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.1.135/6.6.88/6.12.25/6.14.4/6.15-rc3 and classified as critical. This issue affects the function huge_pte_offset of the component LoongArch. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-37818. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.15-rc3. Impacted is an unknown function of the component cdns3. Such manipulation leads to deadlock.
This vulnerability is traded as CVE-2025-37812. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.15-rc3. Affected by this issue is some unknown functionality. Performing manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2025-37810. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.15-rc3 and classified as problematic. This vulnerability affects the function chameleon_parse_gdd of the component mcb. The manipulation leads to double free.
This vulnerability is listed as CVE-2025-37817. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.15-rc3. It has been rated as critical. The impacted element is the function scpi_cpufreq_get_rate of the component cpufreq. Performing manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2025-37829. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.14.4/6.15-rc3. This affects the function dequeue_entities of the component Setting Handler. The manipulation leads to unchecked return value.
This vulnerability is uniquely identified as CVE-2025-37821. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.88/6.12.25/6.14.4/6.15-rc3. It has been classified as critical. Impacted is the function gicv2m_get_fwnode. This manipulation causes use after free.
This vulnerability is registered as CVE-2025-37819. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
In this blog entry, Trend™ Research analyses the layered command-and-control approaches that Lumma Stealer uses to maintain its ongoing operations while enhancing collection of victim-environment data.