A vulnerability classified as critical was found in Linux Kernel up to 6.6.71/6.12.9/6.13-rc6. Affected by this vulnerability is an unknown functionality. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-57926. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. Affected is the function smb2_send_interim_resp. The manipulation leads to unchecked return value.
This vulnerability is traded as CVE-2024-57925. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6. It has been rated as critical. This issue affects the function drm_calc_scale of the component AMD Display. The manipulation leads to divide by zero.
The identification of this vulnerability is CVE-2024-57919. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6. It has been declared as critical. This vulnerability affects the function netfs_read_to_pagecache. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2024-57928. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6. It has been classified as problematic. This affects the function nfs_netfs_init_request. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-57927. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6 and classified as problematic. Affected by this issue is the function encode_fh. The manipulation leads to encoding error.
This vulnerability is handled as CVE-2024-57924. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 and classified as critical. Affected by this vulnerability is the function dcn_bw_ceil2 of the component AMD Display. The manipulation leads to divide by zero.
This vulnerability is known as CVE-2024-57922. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. Affected is the function kvasprintf in the library lib/kasprintf.c. The manipulation leads to unchecked return value.
This vulnerability is traded as CVE-2024-57917. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. This issue affects the function generic_handle_irq of the component GPIO IRQ Handler. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2024-57916. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.12.9/6.13-rc6. This vulnerability affects unknown code of the component AMD GPU. The manipulation leads to race condition.
This vulnerability was named CVE-2024-57921. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.9/6.13-rc6. This affects the function tcpci_irq. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-57914. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. It has been declared as problematic. Affected by this vulnerability is the function dm_bm_read_lock of the file /dev/sdc. The manipulation leads to improper initialization.
This vulnerability is known as CVE-2024-57929. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc1. It has been rated as problematic. Affected by this issue is the function kfd_process_wq_release of the component amdkfd. The manipulation leads to improper initialization.
This vulnerability is handled as CVE-2024-57920. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. It has been classified as problematic. Affected is an unknown function of the component u_serial. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-57915. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6 and classified as critical. This issue affects some unknown processing of the component AMD Display. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2024-57918. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.