A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.7. This affects the function set_memory_decrypted. Executing a manipulation can lead to information disclosure.
The identification of this vulnerability is CVE-2024-57793. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.6. It has been classified as problematic. Impacted is the function oa_tc6_prepare_spi_tx_buf_for_tx_skbs of the component Ethernet Frame Handler. Performing a manipulation results in race condition.
This vulnerability is cataloged as CVE-2024-56788. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.10.232/5.15.175/6.1.122/6.6.68/6.12.7. It has been declared as problematic. The affected element is the function current_limit_map_size. Executing a manipulation can lead to allocation of resources.
This vulnerability is registered as CVE-2024-57792. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.10.232/5.15.175/6.1.121/6.6.67/6.12.6. The impacted element is the function smc_clc_wait_msg. Performing a manipulation results in unchecked return value.
This vulnerability was named CVE-2024-57791. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.175/6.1.121/6.6.67/6.12.6. The affected element is the function drm_mode_vrefresh. Such manipulation leads to divide by zero.
This vulnerability is uniquely identified as CVE-2024-56369. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.12.6. This impacts the function getpagesize. Such manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2024-56368. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.6.67/6.12.6. The affected element is the function tun_napi_alloc_frags of the file net/core/skbuff.c. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-56372. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.5. It has been rated as critical. This issue affects the function disk_zone_wplug_set_error. Performing a manipulation results in deadlock.
This vulnerability is reported as CVE-2024-55642. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.6. Impacted is the function hv_kvp_init. This manipulation causes null pointer dereference.
This vulnerability is handled as CVE-2024-55916. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as problematic has been reported in Linux Kernel up to 5.15.175/6.1.121/6.6.67/6.12.6. This affects the function complete_hypercall_exit in the library arch/x86/kvm/x86.h of the component Hypercall Page Handler. This manipulation causes state issue.
This vulnerability is handled as CVE-2024-55881. The attack can only be done within the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.12.5. This vulnerability affects the function xfs_trans_alloc_dir of the component xfs. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-55641. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.6.67/6.12.6. The impacted element is the function get_net_track of the component SMB Client. The manipulation results in use after free.
This vulnerability is known as CVE-2024-54680. Access to the local network is required for this attack. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.5. Affected by this issue is the function iso_listen_bis. Performing a manipulation results in deadlock.
This vulnerability is reported as CVE-2024-54460. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.