Categoria: CVE

CVE-2024-57926 | Linux Kernel up to 6.6.71/6.12.9/6.13-rc6 use after free

A vulnerability classified as critical was found in Linux Kernel up to 6.6.71/6.12.9/6.13-rc6. Affected by this vulnerability is an unknown functionality. The manipulation leads to use after free. This vulnerability is known as CVE-2024-57926. Access to the local network is required for this attack. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57925 | Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 smb2_send_interim_resp return value

A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. Affected is the function smb2_send_interim_resp. The manipulation leads to unchecked return value. This vulnerability is traded as CVE-2024-57925. The attack needs to be initiated within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57919 | Linux Kernel up to 6.12.9/6.13-rc6 AMD Display drm_calc_scale divide by zero

A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6. It has been rated as critical. This issue affects the function drm_calc_scale of the component AMD Display. The manipulation leads to divide by zero. The identification of this vulnerability is CVE-2024-57919. The attack needs to be done within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57928 | Linux Kernel up to 6.12.9/6.13-rc6 netfs_read_to_pagecache buffer overflow

A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6. It has been declared as critical. This vulnerability affects the function netfs_read_to_pagecache. The manipulation leads to buffer overflow. This vulnerability was named CVE-2024-57928. The attack can only be initiated within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57927 | Linux Kernel up to 6.12.9/6.13-rc6 nfs_netfs_init_request information disclosure

A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6. It has been classified as problematic. This affects the function nfs_netfs_init_request. The manipulation leads to information disclosure. This vulnerability is uniquely identified as CVE-2024-57927. The attack can only be done within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57924 | Linux Kernel up to 6.12.9/6.13-rc6 encode_fh encoding error

A vulnerability was found in Linux Kernel up to 6.12.9/6.13-rc6 and classified as problematic. Affected by this issue is the function encode_fh. The manipulation leads to encoding error. This vulnerability is handled as CVE-2024-57924. The attack needs to be approached within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57922 | Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 AMD Display dcn_bw_ceil2 divide by zero

A vulnerability has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 and classified as critical. Affected by this vulnerability is the function dcn_bw_ceil2 of the component AMD Display. The manipulation leads to divide by zero. This vulnerability is known as CVE-2024-57922. Access to the local network is required for this attack to succeed. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57917 | Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 lib/kasprintf.c kvasprintf return value

A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. Affected is the function kvasprintf in the library lib/kasprintf.c. The manipulation leads to unchecked return value. This vulnerability is traded as CVE-2024-57917. Access to the local network is required for this attack. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57916 | Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 GPIO IRQ generic_handle_irq denial of service

A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. This issue affects the function generic_handle_irq of the component GPIO IRQ Handler. The manipulation leads to denial of service. The identification of this vulnerability is CVE-2024-57916. The attack needs to be initiated within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-57921 | Linux Kernel up to 6.12.9/6.13-rc6 AMD GPU race condition

A vulnerability classified as problematic was found in Linux Kernel up to 6.12.9/6.13-rc6. This vulnerability affects unknown code of the component AMD GPU. The manipulation leads to race condition. This vulnerability was named CVE-2024-57921. The attack needs to be done within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2025-21638 | Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 sysctl null pointer dereference

A vulnerability was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6. It has been classified as critical. This affects an unknown part of the component sysctl. The manipulation leads to null pointer dereference. This vulnerability is uniquely identified as CVE-2025-21638. The attack needs to be approached within the local network. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2025-21637 | Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 sysctl null pointer dereference

A vulnerability was found in Linux Kernel up to 6.1.124/6.6.71/6.12.9/6.13-rc6 and classified as critical. Affected by this issue is some unknown functionality of the component sysctl. The manipulation leads to null pointer dereference. This vulnerability is handled as CVE-2025-21637. Access to the local network is required for this attack to succeed. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più
Caricamento