A vulnerability categorized as problematic has been discovered in Linux Kernel up to 6.12.22/6.13.10/6.14.1. This affects the function s_stream of the file drivers/media/v4l2-core/v4l2-subdev.c of the component vimc. The manipulation results in privilege escalation.
This vulnerability is reported as CVE-2025-22028. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.133/6.6.86/6.12.22/6.13.10/6.14.1. It has been rated as critical. The impacted element is the function ir_raw_event_store_with_filter of the component streamzap. The manipulation leads to race condition.
This vulnerability is documented as CVE-2025-22027. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.22/6.13.10/6.14.1. The impacted element is the function nfsd_nl_listener_set_doit in the library lib/refcount.c. Performing a manipulation results in use after free.
This vulnerability was named CVE-2025-22024. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.14.1 and classified as critical. The affected element is the function dl_stid of the component nfsd. Performing a manipulation results in improper update of reference count.
This vulnerability is identified as CVE-2025-22025. The attack can only be performed from the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 6.14.1 and classified as problematic. The impacted element is the function svc_proc_register of the component nfsd. Executing a manipulation can lead to unchecked return value.
This vulnerability is tracked as CVE-2025-22026. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.14.1. This vulnerability affects the function txBeginAnon of the component jfs. The manipulation results in buffer overflow.
This vulnerability was named CVE-2024-58095. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.14.1. This issue affects the function ath11k_dp_rx_mon_dest_process of the component wifi. This manipulation causes improper initialization.
The identification of this vulnerability is CVE-2024-58096. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.14.1. Impacted is the function buf_id of the component ath11k. Such manipulation leads to infinite loop.
This vulnerability is referenced as CVE-2024-58097. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.14.1. This affects the function ntb_mw_clear_trans of the file drivers/ntb/hw/mscc/ntb_hw_switchtec.c. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2023-53034. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.6.87/6.12.24/6.14.3/6.15-rc2. The impacted element is the function avs_component_probe of the component ASoC. Executing a manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2025-37793. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.14.1. This affects the function jfs_truncate_nolock. The manipulation results in stack-based buffer overflow.
This vulnerability is identified as CVE-2024-58094. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2. Impacted is the function at76_disconnect of the component Wifi. The manipulation leads to use after free.
This vulnerability is traded as CVE-2025-37796. Access to the local network is required for this attack to succeed. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2. Impacted is the function ieee80211_do_stop of the component wifi. The manipulation results in null pointer dereference.
This vulnerability is cataloged as CVE-2025-37794. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel. It has been classified as critical. Impacted is an unknown function of the component ASPM. Performing a manipulation results in use after free.
This vulnerability is cataloged as CVE-2024-58093. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.12.24/6.14.3/6.15-rc2. It has been classified as critical. This issue affects the function ethtool_cmis_module_poll. This manipulation causes denial of service.
This vulnerability is handled as CVE-2025-37791. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2 and classified as problematic. This vulnerability affects unknown code of the component mctp. The manipulation results in privilege escalation.
This vulnerability is known as CVE-2025-37790. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2. Affected by this issue is the function Set of the component net. Executing a manipulation can lead to privilege escalation.
This vulnerability appears as CVE-2025-37789. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.134/6.6.87/6.12.24/6.14.3/6.15-rc2. It has been declared as problematic. Impacted is the function cxgb4_init_ethtool_filters. Such manipulation leads to incorrect control flow.
This vulnerability is uniquely identified as CVE-2025-37788. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.