A vulnerability classified as critical was found in Linux Kernel up to 6.12.1. This vulnerability affects the function kfd_get_cu_occupancy of the component DRM. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-56695. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.173/6.1.119/6.6.63/6.11.10/6.12.1. This affects the function igen6_probe of the component EDAC. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-56708. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.119/6.6.63/6.11.10/6.12.1. It has been rated as problematic. Affected by this issue is the function otx2_mbox_get_rsp of the file otx2_dmac_flt.c. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-56707. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1. It has been declared as problematic. Affected by this vulnerability is the function mutex_lock of the component cpum_sf. The manipulation leads to allocation of resources.
This vulnerability is known as CVE-2024-56706. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1. It has been classified as problematic. Affected is the function ia_css_3a_statistics_allocate of the component atomisp. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2024-56705. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1 and classified as critical. This issue affects the function fmc_send_cmd of the component wl128x. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2024-56700. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.1 and classified as critical. This vulnerability affects the function dwc3_request. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-56698. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.11.10/6.12.1. This affects the function kunit_kzalloc of the file sound_kunit.c. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-56696. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.15.173/6.1.119/6.6.63/6.11.10/6.12.1. Affected by this issue is the function loop_init of the component brd. The manipulation leads to improper initialization.
This vulnerability is handled as CVE-2024-56693. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.12.1. Affected by this vulnerability is the function platform_get_irq of the component mfd. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2024-56691. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.