A vulnerability was found in Linux Kernel up to 6.6.56/6.11.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component bpf. The manipulation leads to unchecked return value.
This vulnerability is handled as CVE-2024-50063. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.56/6.11.3. It has been declared as problematic. Affected by this vulnerability is the function __get_name of the component ntfs3. The manipulation leads to allocation of resources.
This vulnerability is known as CVE-2024-50065. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.56/6.11.3. It has been classified as problematic. Affected is the function kfree of the component zram. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2024-50064. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.112/6.6.56/6.11.3 and classified as problematic. This issue affects some unknown processing of the component io_uring. The manipulation leads to state issue.
The identification of this vulnerability is CVE-2024-50060. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.15.167/6.1.112/6.6.56/6.11.3 and classified as critical. This vulnerability affects the function con_num of the component RDMA. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-50062. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.167/6.1.112/6.6.56/6.11.3. This affects the function skb_network_header of the file net/netfilter/xt_cluster.c. The manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-50038. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.56/6.11.3. Affected by this issue is the function devm_free_irq of the file kernel/irq/devres.c. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-50057. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.11.3. Affected by this vulnerability is the function ERR_PTR of the file uvc_v4l2.c. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-50056. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.56/6.11.3. Affected is the function bus_register. The manipulation leads to double free.
This vulnerability is traded as CVE-2024-50055. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.226/5.15.167/6.1.112/6.6.56/6.11.3. It has been rated as critical. This issue affects some unknown processing of the component AMD Display. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2024-50049. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.112/6.6.56/6.11.3. It has been declared as critical. This vulnerability affects unknown code of the component fbcon. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-50048. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.56/6.11.3. It has been classified as critical. This affects the function cdns_i3c_master_probe. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2024-50061. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.56/6.11.3 and classified as critical. Affected by this vulnerability is the function smb3_calc_signature. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-50047. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.226/5.15.167/6.1.112/6.6.56/6.11.3 and classified as critical. Affected by this issue is the function rfcomm_sk_state_change. The manipulation leads to deadlock.
This vulnerability is handled as CVE-2024-50044. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.56/6.11.3. Affected is the function uart_port_dtr_rts. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-50058. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.11.3. This issue affects the function nfsd4_free_stateid. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-50043. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.11.3 on VF. This vulnerability affects the function ice_vsi_rebuild of the file /sys/bus/pci/devices/$PF_PCI/sriov_drivers_autoprobe. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2024-50042. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.167/6.1.112/6.6.56/6.11.3. This affects the function i40e_del_mac_filter. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2024-50041. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.3. It has been rated as critical. Affected by this issue is the function igb_io_error_detected. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2024-50040. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.