A vulnerability labeled as critical has been found in Linux Kernel up to 6.19-rc4. This affects the function update_eth_regs_async of the component net. Such manipulation leads to memory leak.
This vulnerability is listed as CVE-2026-23021. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.18.5/6.19-rc4. The impacted element is the function btrfs_read_locked_inode. This manipulation causes allocation of resources.
This vulnerability appears as CVE-2026-23018. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.6.121/6.12.66/6.18.6/6.19-rc5. The impacted element is an unknown function of the component dmaengine. The manipulation results in allocation of resources.
This vulnerability is cataloged as CVE-2025-71188. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.121/6.12.66/6.18.6/6.19-rc5. The affected element is an unknown function of the component dmaengine. The manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2025-71185. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.19-rc1. This vulnerability affects the function j1939_session_activate. Performing a manipulation results in state issue.
This vulnerability is cataloged as CVE-2025-71182. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.121/6.12.66/6.18.6/6.19-rc5. It has been declared as critical. This impacts the function of_dma_xlate of the component dmaengine. Executing a manipulation can lead to allocation of resources.
The identification of this vulnerability is CVE-2025-71191. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.18.5/6.19-rc4. The affected element is the function idpf_vc_core_deinit of the component idpf. Executing a manipulation can lead to memory leak.
The identification of this vulnerability is CVE-2026-23022. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.19-rc4. Affected by this issue is some unknown functionality of the component IRQ Handler. This manipulation causes stack-based buffer overflow.
This vulnerability is tracked as CVE-2025-71180. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.18.6/6.19-rc5. Impacted is an unknown function of the component dmaengine. Executing a manipulation can lead to memory leak.
This vulnerability is tracked as CVE-2025-71187. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.12.65/6.18.5/6.19-rc4. It has been rated as critical. Impacted is the function idpf_vport_rel of the component idpf. Performing a manipulation results in memory leak.
This vulnerability was named CVE-2026-23023. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability has been found in Linux Kernel up to 6.6.121/6.12.66/6.18.6/6.19-rc5 and classified as critical. The affected element is the function drain_page_zone of the component page_alloc. This manipulation causes allocation of resources.
This vulnerability is handled as CVE-2026-23025. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.1.160/6.6.120/6.12.65/6.18.5/6.19-rc4 and classified as critical. The impacted element is the function btrfs_log_new_name of the file fs/btrfs/inode.c. Such manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2025-71183. The attack can only be initiated within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.18.5/6.19-rc4. Affected by this vulnerability is the function spin_lock of the component list_lru. The manipulation results in deadlock.
This vulnerability is identified as CVE-2025-71181. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.121/6.12.66/6.18.6/6.19-rc5. This affects an unknown function of the component dmaengine. This manipulation causes allocation of resources.
This vulnerability is registered as CVE-2025-71189. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.121/6.12.66/6.18.6/6.19-rc5 and classified as critical. Affected by this issue is some unknown functionality of the component dmaengine. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2025-71190. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.19-rc4. This vulnerability affects the function devlink_alloc. Such manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2026-23019. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.