A vulnerability was found in Linux Kernel up to 6.11.8. It has been rated as critical. This issue affects some unknown processing of the component LoongArch. The manipulation leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2024-53089. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.11.6. Affected by this issue is the function __mt_dup of the component fork. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2024-50263. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.10/6.12.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component bpf. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-56702. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.11.10/6.12.1. This affects the function kunit_kzalloc of the file sound_kunit.c. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-56696. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.1 and classified as problematic. Affected by this vulnerability is the function bpf_msg_pop_data of the component sockmap. The manipulation leads to enforcement of behavioral workflow.
This vulnerability is known as CVE-2024-56720. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.59/6.11.6. It has been declared as problematic. This vulnerability affects unknown code of the component qmp-usb. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-50240. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.63/6.11.10/6.12.1. Affected is the function gf100_gr_chan_new of the component nouveau. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-56752. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.11.10/6.12.1. This affects the function dlm_recover_members. The manipulation leads to improper update of reference count.
This vulnerability is uniquely identified as CVE-2024-56749. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.53/6.10.12/6.11.1 and classified as critical. This vulnerability affects the function pr_debug of the component ARM. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-47716. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.7. It has been rated as problematic. Affected by this issue is the function panthor_device_mmap_io. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-53071. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.10.13/6.11.2. This affects the function xa_erase of the component panthor. The manipulation leads to improper update of reference count.
This vulnerability is uniquely identified as CVE-2024-50174. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Rational Software ClearCase 2002-05-00/4.1 and classified as problematic. This issue affects some unknown processing of the component Portscan Handler. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2002-1322. The attack may be initiated remotely. Furthermore, there is an exploit available.