A vulnerability was found in Linux Kernel up to 6.6.63/6.11.10/6.12.1. It has been declared as problematic. This vulnerability affects the function iomap_iter_done of the component erofs. The manipulation leads to privilege escalation.
This vulnerability was named CVE-2024-53234. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.10/6.12.1. It has been classified as problematic. This affects the function xsk_build_skb. The manipulation leads to excessive iteration.
This vulnerability is uniquely identified as CVE-2024-53236. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.119/6.6.63/6.11.10/6.12.1 and classified as critical. Affected by this vulnerability is the function cpufreq_cpu_get_raw. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-53231. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.10/6.12.1 and classified as problematic. Affected by this issue is the function __iommu_group_set_domain_nofail of the component s390. The manipulation leads to state issue.
This vulnerability is handled as CVE-2024-53232. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.1. This issue affects the function bfad_im_module_exit of the component scsi. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-53227. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.1. This affects the function max_n_shift of the component tegra241-cmdqv. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-53225. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.1. This vulnerability affects the function hns_roce_map_mr_sg of the component RDMA. The manipulation of the argument sg_offset leads to null pointer dereference.
This vulnerability was named CVE-2024-53226. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.63/6.11.10/6.12.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Device Registration Handler. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-53224. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.63/6.11.10/6.12.1. It has been rated as critical. Affected by this issue is the function f2fs_stop_gc_thread. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-53218. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.