A vulnerability has been found in Linux Kernel up to 6.6.58/6.11.5 and classified as problematic. This vulnerability affects the function nvme_dev_disable of the file drivers/pci/msi/api.c of the component nvme-pci. The manipulation leads to race condition.
This vulnerability was named CVE-2024-50135. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. This affects the function vbva_mouse_pointer_shape of the component vboxvideo. The manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2024-50134. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.58/6.11.5. Affected by this issue is the function __nf_unregister_net_hook of the component netfilter. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-50130. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. Affected by this vulnerability is the function taprio_change. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-50127. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.114/6.6.58/6.11.5. Affected is the function sco_sock_timeout of the component Bluetooth. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-50125. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.114/6.6.58/6.11.5. It has been rated as critical. This issue affects the function iso_sock_timeout of the component Bluetooth. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-50124. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.5. It has been declared as problematic. This vulnerability affects the function bpf_link_show_fdinfo of the component bpf. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2024-50123. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.58/6.11.5. It has been classified as problematic. This affects the function smb3_reconfigure of the component SMB Client. The manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2024-50120. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.5 and classified as problematic. Affected by this issue is the function mempool_create of the file mm/slub.c of the component cifs. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-50119. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.58/6.11.5 and classified as critical. Affected by this vulnerability is the function do_ale in the library arch/loongarch/kernel/access-helper.h of the component LoongArch. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-50111. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5. Affected is the function asoc_qcom_lpass_cpu_platform_probe of the component ASoC. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-50103. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.15.168/6.1.113/6.6.57/6.11.4. This issue affects the function pci_for_each_dma_alias of the component iommu. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-50101. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.11.4. This vulnerability affects the function timer_pending of the component USB. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-50100. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.114/6.6.58/6.11.5. This affects the function stack_top of the component LoongArch. The manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-50133. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.114/6.11.5. It has been rated as critical. Affected by this issue is the function in_atomic of the file kernel/locking/spinlock_rt.c of the component bpf. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-50138. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.5. It has been declared as problematic. Affected by this vulnerability is the function reset_control_status. The manipulation leads to reachable assertion.
This vulnerability is known as CVE-2024-50137. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.