A vulnerability categorized as problematic has been discovered in Linux Kernel up to 5.10.175/5.15.103/6.1.20/6.2.7. Affected is an unknown function of the component active. Such manipulation leads to unchecked return value.
This vulnerability is documented as CVE-2023-53087. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.21/6.2.7. The impacted element is the function mptcp_subflow_queue_clean of the component mptcp. Executing manipulation can lead to improper update of reference count.
The identification of this vulnerability is CVE-2023-53088. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.2.8. It has been rated as critical. This issue affects some unknown processing of the component wifi. The manipulation leads to denial of service.
This vulnerability is listed as CVE-2023-53086. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 5.10.175/5.15.103/6.1.20/6.2.7. Affected by this issue is the function drm_gem_shmem_mmap. The manipulation leads to use after free.
This vulnerability is listed as CVE-2023-53084. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.1.20/6.2.7. This vulnerability affects the function ttm_bo_swapout. This manipulation causes null pointer dereference.
This vulnerability is registered as CVE-2023-53095. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.15.103/6.1.20/6.2.7. Impacted is an unknown function of the component interconnect. Performing manipulation results in allocation of resources.
This vulnerability is reported as CVE-2023-53092. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.10.174/5.15.102/6.1.19/6.2.6. The impacted element is an unknown function of the component media. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2023-53098. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.102/6.1.19/6.2.6 and classified as critical. This impacts the function debugfs_lookup. This manipulation causes memory leak.
This vulnerability is handled as CVE-2023-53097. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.4.237/5.10.175/5.15.103/6.1.20/6.2.7. Impacted is an unknown function of the component interconnect. Such manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2023-53096. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability classified as problematic was found in Linux Kernel up to 6.2.7. The affected element is the function kfd_wait_on_events. Executing manipulation can lead to improper initialization.
This vulnerability appears as CVE-2023-53090. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.103/6.1.20/6.2.7. This affects the function ext4_get_journal. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2023-53091. Access to the local network is required for this attack. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.21/6.2.8. It has been declared as problematic. This vulnerability affects the function nfsd_splice_actor of the component nfsd. Executing manipulation can lead to information disclosure.
This vulnerability is tracked as CVE-2023-53083. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.22/6.2.7. This issue affects the function p:copy_to_user of the file /sys/kernel/tracing/kprobe_events. Such manipulation of the argument arg2 leads to null pointer dereference.
This vulnerability is documented as CVE-2023-53093. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 5.10.176/5.15.104/6.1.22/6.2.7. This issue affects the function lpuart32_shutdown of the component tty. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2023-53094. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.2.7. It has been rated as critical. Affected is the function ext4_xattr_delete_inode of the component ext4. Performing manipulation results in infinite loop.
This vulnerability is identified as CVE-2023-53089. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is advised.