A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function skb_segment of the component net. The manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2025-38124. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.141/6.6.93/6.12.33/6.15.2/6.16-rc1. It has been rated as critical. This issue affects the function for_each_possible_cpu of the component ACPI. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2025-38113. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.16-rc1. It has been declared as critical. This vulnerability affects the function sk_is_readable. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-38112. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.93/6.12.33/6.15.2/6.16-rc1. It has been classified as critical. This affects the function _pf_vf_vports. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-38109. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel and classified as problematic. Affected by this issue is the function usbhid_parse. The manipulation of the argument bNumDescriptors leads to out-of-bounds read.
This vulnerability is handled as CVE-2025-38103. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.33/6.15.2 and classified as critical. Affected by this vulnerability is the function ring_buffer_subbuf_order_set. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2025-38101. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.12.30/6.14.8. Affected is an unknown function of the component Bluetooth. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2025-38099. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.16-rc1. This issue affects some unknown processing of the component mdiobus. The manipulation leads to out-of-bounds write.
The identification of this vulnerability is CVE-2025-38111. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.30/6.14.8. This affects the function iwl_trans_reclaim of the component wifi. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2025-38096. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.16-rc1. This vulnerability affects the function ufshcd_err_handling_prepare. The manipulation leads to denial of service.
This vulnerability was named CVE-2025-38119. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.93/6.12.33/6.15.2/6.16-rc1. It has been rated as critical. Affected by this issue is some unknown functionality of the component mdiobus. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2025-38110. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.140/6.6.92/6.12.30/6.14.8. It has been declared as problematic. Affected by this vulnerability is the function xfrm_state of the component espintcp. The manipulation leads to state issue.
This vulnerability is known as CVE-2025-38097. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.14.7. It has been classified as critical. Affected is the function macb_halt_tx. The manipulation leads to deadlock.
This vulnerability is traded as CVE-2025-38094. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.15.2 and classified as problematic. This issue affects the function snd_usbmidi_free of the component ALSA. The manipulation leads to improper initialization.
The identification of this vulnerability is CVE-2025-38105. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.139/6.6.91/6.12.29/6.14.7 and classified as critical. This vulnerability affects the function smp_store_mb of the component dma-buf. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-38095. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.93/6.12.33/6.15.2. This affects the function dev_gro_receive of the component net. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2025-38123. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.93/6.12.33/6.15.2/6.16-rc1. Affected by this issue is the function mgmt_pending of the component Bluetooth. The manipulation leads to use after free.
This vulnerability is handled as CVE-2025-38117. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.16-rc1. Affected by this vulnerability is the function __red_change of the component net_sched. The manipulation leads to race condition.
This vulnerability is known as CVE-2025-38108. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function ets_qdisc_change of the component net_sched. The manipulation leads to race condition.
This vulnerability is traded as CVE-2025-38107. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.