A vulnerability labeled as critical has been found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2/6.14-rc1. The impacted element is the function events_unbound of the component btrfs. The manipulation results in use after free.
This vulnerability was named CVE-2025-21753. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.6.77/6.12.13/6.13.2/6.14-rc1. This impacts the function btrfs_destroy_ordered_extents of the component Direct IO Write Handler. Such manipulation leads to injection.
This vulnerability is referenced as CVE-2025-21754. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.6.78/6.12.15/6.13.3. It has been declared as critical. This impacts the function bind in the library lib/refcount.c. The manipulation results in use after free.
This vulnerability is reported as CVE-2025-21756. The attacker must have access to the local network to execute the attack. Moreover, an exploit is present.
It is recommended to upgrade the affected component.
A vulnerability marked as problematic has been reported in Linux Kernel up to 6.13.2. This affects the function btrfs_set_item_key_safe of the file fs/btrfs/ctree.c. This manipulation causes privilege escalation.
The identification of this vulnerability is CVE-2025-21752. The attack needs to be done within the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. The affected element is the function of_property_read_string_index of the component brcmfmac. The manipulation leads to uninitialized pointer.
This vulnerability is uniquely identified as CVE-2025-21750. The attack can only be initiated within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.13.2. Affected is the function reconnects of the component mlx5. Performing manipulation results in use after free.
This vulnerability is identified as CVE-2025-21751. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.13.2/6.14-rc1. Affected by this issue is some unknown functionality of the component ast. The manipulation leads to information exposure through error message.
This vulnerability is listed as CVE-2025-21747. The attack must be carried out from within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2/6.14-rc1. It has been classified as problematic. This affects the function rose_bind. The manipulation leads to denial of service.
This vulnerability is documented as CVE-2025-21749. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2 on 32-bit. This affects the function ipc_msg_alloc of the component ksmbd. The manipulation results in integer overflow.
This vulnerability is cataloged as CVE-2025-21748. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. Affected by this vulnerability is the function blkcg_fill_root_iostats of the component blk-cgroup. Executing manipulation can lead to improper update of reference count.
This vulnerability is tracked as CVE-2025-21745. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability has been found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2 and classified as critical. The affected element is the function brcmf_txfinalize of the component brcmfmac. Performing manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-21744. The attack must originate from the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.13.2 and classified as critical. The impacted element is the function open/close of the component synaptics. Executing manipulation can lead to denial of service.
This vulnerability is registered as CVE-2025-21746. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.77/6.12.13/6.13.2. This issue affects some unknown processing of the component ipheth. This manipulation causes buffer overflow.
This vulnerability is tracked as CVE-2025-21743. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.136/5.15.60/5.18.17/5.19.1. It has been declared as critical. Affected is the function virtio_gpu_cmd_get_capset. The manipulation results in null pointer dereference.
This vulnerability was named CVE-2022-50181. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.