A vulnerability marked as critical has been reported in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This vulnerability affects the function rpl_do_srh_inline. This manipulation causes use after free.
This vulnerability is handled as CVE-2025-38476. It is possible to launch the attack on the local host. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.39/6.15.7. The affected element is the function cipso_v4_sock_setattr of the component smc. Executing manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2025-38475. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This affects the function sch_qfq. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-38477. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.6.99/6.12.39/6.15.7. Impacted is the function kmalloc_array of the component KVM. Performing manipulation results in privilege escalation.
This vulnerability was named CVE-2025-38469. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7 and classified as critical. This impacts the function unregister_vlan_dev of the component 8021q Module. This manipulation causes memory leak.
This vulnerability is tracked as CVE-2025-38470. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7/2277d7cbdf47531b2c3cd01ba15255fa955aab35. It has been classified as critical. Affected by this vulnerability is the function tls_strp_check_rcv of the component tls. Performing manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-38471. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. The impacted element is the function l2cap_sock_resume_cb of the file include/linux/instrumented.h of the component Bluetooth. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2025-38473. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. It has been declared as critical. Affected by this issue is the function __nf_conntrack_find_get of the component netfilter. Executing manipulation can lead to allocation of resources.
This vulnerability is registered as CVE-2025-38472. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. The impacted element is an unknown function of the component usb. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2025-38474. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.146/6.6.99/6.12.39/6.15.7. This issue affects the function htb_enqueue. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-38468. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in Google Go up to 1.23.11/1.24.5. The impacted element is an unknown function of the component database-sql. The manipulation leads to race condition.
This vulnerability is traded as CVE-2025-47907. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Google Go up to 1.23.11/1.24.5. It has been classified as problematic. This issue affects the function LookPath of the component os-exec. Performing manipulation of the argument PATH results in an unknown weakness.
This vulnerability is identified as CVE-2025-47906. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in uclouvain openjpeg up to 2.5.3. Affected by this vulnerability is the function opj_jp2_read_header. This manipulation causes use of uninitialized variable.
This vulnerability is registered as CVE-2025-54874. Remote exploitation of the attack is possible. No exploit is available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in Linux Kernel up to 6.15.2. It has been declared as critical. This issue affects the function do_change_type. Such manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2025-38498. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in libxslt. Impacted is the function key of the component Attribute Type Handler. This manipulation of the argument atype causes use after free.
This vulnerability is handled as CVE-2025-7425. It is possible to launch the attack on the local host. There is not any exploit available.