Aggregator
CVE-2024-57980 | Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1 uvc_status_init double free
9 months 2 weeks ago
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. This affects the function uvc_status_init. The manipulation leads to double free.
This vulnerability is uniquely identified as CVE-2024-57980. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-57978 | Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1 detach_pm null pointer dereference
9 months 2 weeks ago
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. Affected by this issue is the function detach_pm. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-57978. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-57973 | Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1 process_responses tot_len integer overflow
9 months 2 weeks ago
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.128/6.6.75/6.12.12/6.13.1. Affected by this vulnerability is the function process_responses. The manipulation of the argument tot_len leads to integer overflow.
This vulnerability is known as CVE-2024-57973. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-57953 | Linux Kernel up to 6.12.12/6.13.1 tps6594_rtc_set_offset tmp integer overflow
9 months 2 weeks ago
A vulnerability classified as problematic has been found in Linux Kernel up to 6.12.12/6.13.1. Affected is the function tps6594_rtc_set_offset. The manipulation of the argument tmp leads to integer overflow.
This vulnerability is traded as CVE-2024-57953. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21797 | Linux Kernel up to 6.13.3/6.14-rc2 cancel_delayed_work_sync use after free
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.13.3/6.14-rc2. It has been rated as critical. This issue affects the function cancel_delayed_work_sync. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2025-21797. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21795 | Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2 nfsd4_shutdown_callback state issue
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. It has been declared as critical. This vulnerability affects the function nfsd4_shutdown_callback. The manipulation leads to state issue.
This vulnerability was named CVE-2025-21795. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21794 | Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc1/6.14-rc2 usb.c usb_check_int_endpoints out-of-bounds
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc1/6.14-rc2. It has been classified as problematic. This affects the function usb_check_int_endpoints of the file usb.c. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2025-21794. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21793 | Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2 sn-f-ospi divide by zero
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2 and classified as critical. Affected by this issue is some unknown functionality of the component sn-f-ospi. The manipulation leads to divide by zero.
This vulnerability is handled as CVE-2025-21793. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21788 | Linux Kernel up to 6.12.15/6.13.3/6.14-rc2 am65_cpsw_build_skb allocation of resources
9 months 2 weeks ago
A vulnerability has been found in Linux Kernel up to 6.12.15/6.13.3/6.14-rc2 and classified as critical. Affected by this vulnerability is the function am65_cpsw_build_skb. The manipulation leads to allocation of resources.
This vulnerability is known as CVE-2025-21788. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21785 | Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2 cacheinfo out-of-bounds write
9 months 2 weeks ago
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. Affected is an unknown function of the component cacheinfo. The manipulation leads to out-of-bounds write.
This vulnerability is traded as CVE-2025-21785. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21784 | Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2 psp_init_cap_microcode Privilege Escalation
9 months 2 weeks ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2. This issue affects the function psp_init_cap_microcode. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2025-21784. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21783 | Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2 gpiochip_get_ngpios null pointer dereference
9 months 2 weeks ago
A vulnerability classified as critical was found in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2. This vulnerability affects the function gpiochip_get_ngpios. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-21783. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21782 | Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3 orangefs_debug_write out-of-bounds
9 months 2 weeks ago
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3. This affects the function orangefs_debug_write. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2025-21782. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21780 | Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2 smu_sys_set_pp_table buffer overflow
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. It has been rated as critical. Affected by this issue is the function smu_sys_set_pp_table. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2025-21780. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21777 | Linux Kernel up to 6.12.15/6.13.3/6.14-rc2 ring-buffer nr_subbufs buffer overflow
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.12.15/6.13.3/6.14-rc2. It has been declared as critical. Affected by this vulnerability is the function nr_subbufs of the component ring-buffer. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2025-21777. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21775 | Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2 ctucan_err_interrupt allocation of resources
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. It has been classified as problematic. Affected is the function ctucan_err_interrupt. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2025-21775. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21774 | Linux Kernel up to 6.12.15/6.13.3/6.14-rc2 rkcanfd_handle_rx_fifo_overflow_int null pointer dereference
9 months 2 weeks ago
A vulnerability was found in Linux Kernel up to 6.12.15/6.13.3/6.14-rc2 and classified as critical. This issue affects the function rkcanfd_handle_rx_fifo_overflow_int. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2025-21774. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21773 | Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2 etas_es58x null pointer dereference
9 months 2 weeks ago
A vulnerability has been found in Linux Kernel up to 6.6.78/6.12.15/6.13.3/6.14-rc2 and classified as critical. This vulnerability affects unknown code of the component etas_es58x. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2025-21773. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-21772 | Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2 put_dev_sector out-of-bounds
9 months 2 weeks ago
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.128/6.6.78/6.12.15/6.13.3/6.14-rc2. This affects the function put_dev_sector. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2025-21772. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com