A vulnerability was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. It has been rated as problematic. This issue affects some unknown processing of the component devmap. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2024-50162. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.114/6.6.58/6.11.5. It has been declared as problematic. This vulnerability affects the function cond_resched of the file /proc/sys/kernel/hung_task_timeout_secs. The manipulation leads to state issue.
This vulnerability was named CVE-2024-50155. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.58/6.11.5. It has been classified as problematic. This affects the function bnxt_re_setup_chip_ctx of the component RDMA. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2024-50172. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.58/6.11.5 and classified as problematic. Affected by this issue is the function read_skb of the file net/vmw_vsock/virtio_transport_common.c. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-50169. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.58/6.11.5 and classified as problematic. Affected by this vulnerability is the function mac_probe of the component fman. The manipulation leads to improper update of reference count.
This vulnerability is known as CVE-2024-50166. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. Affected is the function sun3_82586_send_packet. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2024-50168. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.11.5. This vulnerability affects the function btf_repeat_fields of the file /kernel/bpf/btf.c. The manipulation leads to improper validation of array index.
This vulnerability was named CVE-2024-50161. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. This issue affects the function bpf_redirect_neigh. The manipulation leads to allocation of resources.
The identification of this vulnerability is CVE-2024-50163. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.11.5. This affects the function bpf_parse_param. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2024-50165. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. It has been rated as problematic. Affected by this issue is the function snd_hda_gen_add_kctl of the component cs8409. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-50160. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.58/6.11.5. It has been declared as problematic. Affected by this vulnerability is the function scmi_debugfs_common_setup of the file drivers/firmware/arm_scmi/driver.c. The manipulation leads to double free.
This vulnerability is known as CVE-2024-50159. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.58/6.11.5. It has been classified as problematic. Affected is an unknown function of the component bnxt_re. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2024-50158. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.5 and classified as problematic. This issue affects some unknown processing of the component bnxt_re. The manipulation leads to infinite loop.
The identification of this vulnerability is CVE-2024-50157. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5 and classified as problematic. This vulnerability affects the function msm_disp_state_print_regs. The manipulation leads to improper initialization.
This vulnerability was named CVE-2024-50156. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. This affects the function target_alloc_device of the component scsi. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-50153. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.