A vulnerability was found in Linux Kernel up to 5.15.173/6.1.119/6.6.63/6.11.10/6.12.1. It has been declared as critical. This vulnerability affects the function reset_method_store of the component PCI. The manipulation leads to memory leak.
This vulnerability was named CVE-2024-56745. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1. It has been classified as critical. This affects the function nfs3_read_done of the component localio. The manipulation of the argument res.replen leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-56740. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1 and classified as problematic. Affected by this issue is some unknown functionality of the component nfs_common. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-56743. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.1 and classified as problematic. Affected by this vulnerability is the function __nvme_alloc_host_mem of the component nvme-pci. The manipulation leads to allocation of resources.
This vulnerability is known as CVE-2024-56756. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.63/6.11.10/6.12.1. Affected is the function gf100_gr_chan_new of the component nouveau. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-56752. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.12.1. This issue affects the function sb_set_blocksize of the component erofs. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-56750. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.1. This vulnerability affects the function qedf_alloc_and_init_sb of the component scsi. The manipulation leads to memory leak.
This vulnerability was named CVE-2024-56748. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.1. This affects the function qedi_alloc_and_init_sb of the component scsi. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2024-56747. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1. It has been rated as critical. Affected by this issue is the function sh7760fb_alloc_mem of the component fbdev. The manipulation leads to memory leak.
This vulnerability is handled as CVE-2024-56746. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.10/6.12.1. It has been declared as critical. Affected by this vulnerability is the function mlx5vf_add_migration_pages of the component vfio. The manipulation leads to memory leak.
This vulnerability is known as CVE-2024-56742. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1. It has been classified as critical. Affected is the function aa_unpack_strdup of the component apparmor. The manipulation leads to memory leak.
This vulnerability is traded as CVE-2024-56741. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1 and classified as problematic. This issue affects the function rtc_timer_do_work. The manipulation leads to uninitialized pointer.
The identification of this vulnerability is CVE-2024-56739. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.1 and classified as critical. This vulnerability affects the function kzalloc of the component usbg. The manipulation leads to uncontrolled memory allocation.
This vulnerability was named CVE-2024-56730. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.6.63/6.11.10/6.12.1. This affects the function cached_dir_lease_break of the component smb. The manipulation leads to improper initialization.
This vulnerability is uniquely identified as CVE-2024-56729. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.12.1. Affected by this issue is the function otx2_mbox_get_rsp of the file otx2_ethtool.c of the component octeontx2-pf. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-56728. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.119/6.6.63/6.11.10/6.12.1. Affected by this vulnerability is the function otx2_mbox_get_rsp of the file otx2_flows.c of the component octeontx2-pf. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2024-56727. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 5.15.173/6.1.119/6.6.63/6.11.10/6.12.1. Affected is the function otx2_mbox_get_rsp of the file cn10k.c of the component octeontx2-pf. The manipulation leads to Privilege Escalation.
This vulnerability is traded as CVE-2024-56726. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.119/6.6.63/6.11.10/6.12.1. It has been rated as problematic. This issue affects the function otx2_mbox_get_rsp of the file otx2_dcbnl.c. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-56725. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.