A vulnerability was found in Linux Kernel up to 6.1.128/6.6.77/6.12.13/6.13.2. It has been rated as problematic. Affected by this issue is the function offsetof of the component MSM8916 Handler. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2024-58007. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. It has been rated as problematic. Affected by this issue is the function wcn->chan_survey. The manipulation leads to improper initialization.
This vulnerability is handled as CVE-2024-57997. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.75/6.12.12/6.13.1. It has been classified as critical. This affects the function _read_freq. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-57998. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. It has been declared as critical. Affected by this vulnerability is the function hid_apply_multipler. The manipulation leads to infinite loop.
This vulnerability is known as CVE-2024-57986. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. Affected by this issue is the function detach_pm. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-57978. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. This affects the function uvc_status_init. The manipulation leads to double free.
This vulnerability is uniquely identified as CVE-2024-57980. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1 and classified as critical. This vulnerability affects the function xhci_handle_stopped_cmd_ring. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-57981. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3 and classified as critical. This vulnerability affects the function vidtv_mux_init of the component vidtv. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-57834. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3 and classified as critical. This vulnerability affects the function bsg_queue of the component scsi. The manipulation leads to use after free.
This vulnerability was named CVE-2024-54458. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. Affected by this vulnerability is the function process_responses. The manipulation of the argument tot_len leads to integer overflow.
This vulnerability is known as CVE-2024-57973. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.8. It has been rated as critical. Affected by this issue is some unknown functionality of the component AMD Display. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-42122. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.