A vulnerability classified as critical has been found in Linux Kernel up to 6.1.10. This vulnerability affects the function cond_resched of the component swapfile. Performing manipulation results in infinite loop.
This vulnerability is known as CVE-2023-52932. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.10. Impacted is the function find_pmd_or_thp_or_none. Performing manipulation results in state issue.
This vulnerability was named CVE-2023-52934. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.10 and classified as problematic. This impacts the function xattr_ids. This manipulation causes insufficient verification of data authenticity.
This vulnerability is tracked as CVE-2023-52933. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability described as problematic has been identified in Linux Kernel up to 6.1.10. This affects the function dev_set_name of the component nvmem. Such manipulation leads to incomplete cleanup.
This vulnerability is traded as CVE-2023-52929. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 5.10.167/5.15.92/6.1.10 and classified as problematic. This affects the function bit_17 of the component i915. Executing manipulation can lead to double free.
This vulnerability is tracked as CVE-2023-52930. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.10. It has been classified as critical. This vulnerability affects the function vm_xa of the component i915. The manipulation leads to use after free.
This vulnerability is listed as CVE-2023-52931. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability has been found in Linux Kernel up to 5.15.92/6.1.10 and classified as problematic. Affected by this issue is the function check_kfunc_call of the file kernel/bpf/verifier.c. Performing manipulation results in privilege escalation.
This vulnerability is identified as CVE-2023-52928. The attack can only be performed from the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Linux Kernel. The affected element is the function nft_payload_copy_vlan of the file nft_payload.c of the component Netfilter Subsystem. The manipulation results in buffer overflow.
This vulnerability was named CVE-2023-0179. The attack needs to be approached within the local network. There is no available exploit.
A patch should be applied to remediate this issue.
A vulnerability labeled as problematic has been found in Linux Kernel up to 6.1.7. Affected by this vulnerability is the function hugetlb_change_protection. The manipulation of the argument pte results in improper update of reference count.
This vulnerability is reported as CVE-2022-49760. The attacker must have access to the local network to execute the attack. No exploit exists.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Linux Kernel up to 5.10.164/5.15.89/6.1.7. Affected by this issue is the function run_one_delayed_ref of the component btrfs. This manipulation causes use after free.
This vulnerability appears as CVE-2022-49761. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.7. This affects the function vmci_dispatch_dgs of the file drivers/misc/vmw_vmci/vmci_guest.c. The manipulation results in deadlock.
This vulnerability is identified as CVE-2022-49759. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.15.178/6.1.129/6.6.80/6.12.17/6.13.5. Affected is the function dput in the library fs/overlayfs/util.c. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-21887. The attack must originate from the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.164/6.1.102/6.6.43/6.10.2. It has been declared as critical. Affected is the function memset of the file nft_concat_range.sh of the component netfilter. Such manipulation leads to buffer overflow.
This vulnerability is listed as CVE-2024-57947. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.30/6.14.8. It has been rated as problematic. Affected by this issue is the function kfree_skb of the component espintcp. This manipulation causes memory leak.
This vulnerability is tracked as CVE-2025-38057. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.