A vulnerability was found in Linux Kernel up to 6.6.116/6.12.57/6.17.7. It has been rated as critical. Affected by this vulnerability is the function walk_stackframe of the component riscv. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2025-40358. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 5.15.196/6.1.158/6.6.116/6.12.57/6.17.7. It has been declared as critical. Affected is the function __drm_gem_reset_shadow_plane of the component sysfb. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2025-40360. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.57/6.17.7. Affected by this vulnerability is the function __grt_latency_data. Executing a manipulation can lead to out-of-bounds read.
The identification of this vulnerability is CVE-2025-40359. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.55/6.17.5. This affects the function inet_create of the component smc. Executing a manipulation can lead to denial of service.
This vulnerability is tracked as CVE-2025-40357. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability has been found in Linux Kernel up to 6.12.55/6.17.5 and classified as critical. The impacted element is the function copy_highpage. Performing a manipulation results in allocation of resources.
This vulnerability is reported as CVE-2025-40353. The attacker must have access to the local network to execute the attack. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.17.5 and classified as critical. This affects the function __dev_change_net_namespace of the file net/core/dev.c of the component sysfs. Executing a manipulation can lead to privilege escalation.
This vulnerability appears as CVE-2025-40355. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.17.5. It has been classified as critical. Affected is the function dma_map_single of the file kernel/dma/debug.c of the component spi. This manipulation causes allocation of resources.
This vulnerability is registered as CVE-2025-40356. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.55/6.17.5. The affected element is the function hw_init. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-40354. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.17.5. This issue affects the function hfsplus_delete_cat of the component hfsplus. The manipulation leads to denial of service.
This vulnerability is referenced as CVE-2025-40351. The attack needs to be initiated within the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.17.5. It has been rated as critical. This impacts the function sysfs_attr_init of the component mellanox. This manipulation causes improper initialization.
This vulnerability appears as CVE-2025-40352. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in Linux Kernel up to 6.17.5. This issue affects the function hfsplus_bmap_alloc of the component hfs. The manipulation results in out-of-bounds read.
This vulnerability is cataloged as CVE-2025-40349. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Linux Kernel up to 6.6.114/6.12.55/6.17.5. This vulnerability affects the function bpf_xdp_adjust_tail of the component mlx5e. The manipulation results in privilege escalation.
This vulnerability was named CVE-2025-40350. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.6.114/6.12.55/6.17.5. This affects the function enetc_mdio_lock. Performing a manipulation results in deadlock.
This vulnerability was named CVE-2025-40347. The attack needs to be approached within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.12.55/6.17.5. This affects the function alloc_slab_obj_exts of the component slab. This manipulation causes null pointer dereference.
This vulnerability is handled as CVE-2025-40348. The attack can only be done within the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in QEMU. The impacted element is an unknown function of the component VMDK Compressed Grain Parsing. The manipulation results in out-of-bounds read.
This vulnerability is cataloged as CVE-2026-2243. The attack must originate from the local network. There is no exploit available.
A vulnerability was found in Tanium TanOS. It has been classified as problematic. This impacts an unknown function. Performing a manipulation results in sensitive information in log files.
This vulnerability is reported as CVE-2026-2605. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel 3.18 and classified as critical. This vulnerability affects unknown code of the file /dev/sg0. Executing a manipulation can lead to improper access controls.
The identification of this vulnerability is CVE-2018-1000204. The attack may be launched remotely. There is no exploit available.
There are still doubts about whether this vulnerability truly exists.
A patch should be applied to remediate this issue.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.17.5. The impacted element is the function topology_parse_cpu_capacity in the library include/linux/err.h of the component arch_topology. The manipulation results in null pointer dereference.
This vulnerability is known as CVE-2025-40346. Access to the local network is required for this attack. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Microsoft Windows up to Server 2019. It has been declared as critical. The impacted element is an unknown function of the component lnk File Handler. Executing a manipulation can lead to link following.
The identification of this vulnerability is CVE-2019-1188. The attack may be launched remotely. There is no exploit available.
It is best practice to apply a patch to resolve this issue.