A vulnerability classified as critical was found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7. Affected by this vulnerability is the function ice_vsi_cfg_def+0x607/0x850 of the file /sys/kernel/debug/kmemleak. The manipulation leads to improper initialization.
This vulnerability is known as CVE-2025-21981. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.12.19/6.13.7. Affected is the function kvfree_rcu. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2025-21983. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.19/6.13.7. It has been rated as problematic. This issue affects the function devm_kasprintf. The manipulation leads to unchecked return value.
The identification of this vulnerability is CVE-2025-21982. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7. It has been declared as critical. This vulnerability affects the function gred_init. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-21980. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7. It has been classified as problematic. This affects the function wiphy_work. The manipulation leads to improper initialization.
This vulnerability is uniquely identified as CVE-2025-21979. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7 and classified as problematic. Affected by this issue is the function iounmap. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2025-21978. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7 and classified as problematic. Affected by this vulnerability is the function mlx5_chains_create_table. The manipulation leads to unchecked return value.
This vulnerability is known as CVE-2025-21975. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.19/6.13.7. Affected is the function frag_list. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2025-21972. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.83/6.12.19/6.13.7. This issue affects the function ksmbd_free_work_struct. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2025-21967. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.83/6.12.19/6.13.7. This affects the function corrupt_bio_byte. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2025-21966. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.19/6.13.7. This vulnerability affects the function scx_bpf_select_cpu_dfl. The manipulation leads to denial of service.
This vulnerability was named CVE-2025-21965. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.19/6.13.7. It has been rated as critical. Affected by this issue is some unknown functionality of the file drivers/video/fbdev/core/fb_info.c of the component hyperv_fb. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2025-21976. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.19/6.13.7. It has been declared as critical. Affected by this vulnerability is the function kexec_file_load. The manipulation leads to denial of service.
This vulnerability is known as CVE-2025-21977. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.19/6.13.7. It has been classified as critical. Affected is the function bnxt_queue_mem_alloc. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2025-21974. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.83/6.12.19/6.13.7 and classified as critical. This issue affects the function l2cap_send_cmd of the component Bluetooth. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2025-21969. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7 and classified as problematic. This vulnerability affects the function mlx5_esw_bridge_lag_rep_get. The manipulation leads to improper initialization.
This vulnerability was named CVE-2025-21970. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7. This affects the function hdcp_work of the component AMD Display. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-21968. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7. Affected by this vulnerability is an unknown functionality of the component cifs. The manipulation leads to integer overflow.
This vulnerability is known as CVE-2025-21963. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.1.131/6.6.83/6.12.19/6.13.7. Affected by this issue is some unknown functionality of the component cifs. The manipulation leads to integer overflow.
This vulnerability is handled as CVE-2025-21964. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.