A vulnerability was found in Linux Kernel up to 6.6.59/6.11.6. It has been classified as problematic. This affects the function alloc_size of the component ntfs3. The manipulation leads to Privilege Escalation.
This vulnerability is uniquely identified as CVE-2024-50246. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.170/6.1.115/6.6.59/6.11.6 and classified as problematic. Affected by this issue is the function ni_lock_dir of the component ntfs3. The manipulation leads to deadlock.
This vulnerability is handled as CVE-2024-50245. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.59/6.11.6 and classified as problematic. Affected by this vulnerability is the function ntfs_file_release of the component ntfs3. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2024-50242. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.115/6.6.59/6.11.6. Affected is the function __hci_cmd_sync_sk. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-50255. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.6.59/6.11.6. This issue affects the function copy_page_from_iter_atomic of the component iov_iter. The manipulation leads to infinite loop.
The identification of this vulnerability is CVE-2024-50222. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.11.6. This vulnerability affects the function sock_map_link_update_prog of the component sock_map. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-50260. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.11.6. This affects the function skb_checksum of the component netfilter. The manipulation leads to Privilege Escalation.
This vulnerability is uniquely identified as CVE-2024-50251. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.59/6.11.6. It has been rated as critical. Affected by this issue is the function mi_enum_attr of the component ntfs3. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2024-50248. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.170/6.1.115/6.6.59/6.11.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component ntfs3. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-50247. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.170/6.1.115/6.6.59/6.11.6. It has been classified as problematic. Affected is the function ni_clear of the component ntfs3. The manipulation leads to uninitialized pointer.
This vulnerability is traded as CVE-2024-50244. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.59/6.11.6 and classified as problematic. This issue affects the function ntfs_create_inode of the component ntfs3. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-50243. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.11.6 and classified as critical. This vulnerability affects the function cleanup_async_copy. The manipulation of the argument async_copies leads to improper initialization.
This vulnerability was named CVE-2024-50241. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.11.6. This affects the function get_txpower of the component mac80211. The manipulation leads to uninitialized pointer.
This vulnerability is uniquely identified as CVE-2024-50237. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.1.115/6.6.59/6.11.6. Affected by this issue is some unknown functionality of the component cfg80211. The manipulation leads to double free.
This vulnerability is handled as CVE-2024-50235. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.11.6. Affected by this vulnerability is the function ad9832_calc_freqreg. The manipulation leads to divide by zero.
This vulnerability is known as CVE-2024-50233. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.15.170/6.1.115/6.6.59/6.11.6. Affected is the function ad7124_set_channel_odr. The manipulation leads to divide by zero.
This vulnerability is traded as CVE-2024-50232. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.6. It has been rated as problematic. This issue affects the function tb_retimer_scan. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2024-50227. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.59/6.11.6. It has been declared as problematic. This vulnerability affects the function spi_get_csgpiod. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-50224. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.59/6.11.6. It has been classified as problematic. This affects the function task_numa_work. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-50223. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.