A vulnerability has been found in Linux Kernel up to 6.10.12/6.11.1 and classified as problematic. The impacted element is an unknown function of the component rtw89. The manipulation leads to out-of-bounds read.
This vulnerability is listed as CVE-2024-47721. The attack must be carried out from within the local network. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.6.53/6.10.12/6.11.1 and classified as problematic. The impacted element is the function ALIGN of the file drivers/iommu/iommufd/io_pagetable.c of the component iommufd. Executing a manipulation can lead to allocation of resources.
This vulnerability appears as CVE-2024-47719. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.1. It has been declared as critical. This issue affects the function rtw_wait_firmware_completion of the component rtw88. Executing a manipulation can lead to use after free.
This vulnerability appears as CVE-2024-47718. The attacker needs to be present on the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.167/6.1.112/6.6.53/6.10.12/6.11.1. It has been rated as critical. Impacted is the function dcn30_set_output_transfer_func of the component AMD Display. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-47720. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.6.53/6.7/6.10.12/6.11.1. This issue affects the function mt7915_band_config. The manipulation results in race condition.
This vulnerability is identified as CVE-2024-47715. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Linux Kernel up to 6.10.12/6.11.1. Impacted is the function kvm_vcpu_write_guest of the component RISC-V. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2024-47717. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.53/6.10.12/6.11.1. This affects the function pr_debug of the component ARM. Performing a manipulation results in denial of service.
This vulnerability is identified as CVE-2024-47716. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.1. It has been declared as problematic. Affected is the function ieee80211_do_stop of the file kernel/softirq.c of the component mac80211. Such manipulation leads to privilege escalation.
This vulnerability is documented as CVE-2024-47713. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.6.53/6.10.12/6.11.1. The affected element is the function tx_ant. Executing a manipulation can lead to out-of-bounds read.
This vulnerability is tracked as CVE-2024-47714. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.11.1. Affected by this issue is the function wilc_parse_join_bss_param of the component wilc1000. Executing a manipulation can lead to use after free.
This vulnerability appears as CVE-2024-47712. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.11.1. This vulnerability affects the function manage_oob of the component af_unix. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2024-47711. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability has been found in Linux Kernel up to 6.11.1 and classified as problematic. The affected element is the function remove_proc_entry of the file fs/proc/generic.c. Performing a manipulation results in privilege escalation.
This vulnerability is reported as CVE-2024-47709. The attacker must have access to the local network to execute the attack. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.11.1. Impacted is the function sock_hash_free of the component sock_map. Performing a manipulation results in privilege escalation.
This vulnerability is identified as CVE-2024-47710. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.1. It has been classified as critical. This vulnerability affects the function skb_do_redirect of the component netkit. Performing a manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2024-47708. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1. This affects the function rt6_uncached_list_flush_dev of the component ipv6. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2024-47707. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.1 and classified as critical. This affects the function bfq_insert_request of the file block/bfq-iosched.c. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2024-47706. The attack requires being on the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.10.12/6.11.1. This issue affects the function file_alloc_security of the component BPF. Such manipulation leads to unchecked return value.
This vulnerability is referenced as CVE-2024-47703. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.6.54/6.10.13/6.11.1. Affected by this issue is some unknown functionality of the component AMD Display. Performing a manipulation results in null pointer dereference.
This vulnerability was named CVE-2024-47704. The attack needs to be approached within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.11.1 and classified as critical. Affected by this issue is the function blk_add_partition. This manipulation causes null pointer dereference.
This vulnerability is registered as CVE-2024-47705. The attack requires access to the local network. No exploit is available.
The affected component should be upgraded.