A vulnerability has been found in Linux Kernel up to 6.13.5 and classified as critical. Impacted is the function drm_fbdev_dma_driver_fbdev_probe of the component fbdev-dma. Performing manipulation results in null pointer dereference.
This vulnerability is reported as CVE-2024-58091. The attacker must have access to the local network to execute the attack. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.10.163/5.15.88/6.1.6. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the component nft_payload. Performing manipulation results in privilege escalation.
This vulnerability is cataloged as CVE-2023-53033. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.1.6. This vulnerability affects the function bitmap_ip_create of the component netfilter. Executing manipulation can lead to insufficiently random values.
The identification of this vulnerability is CVE-2023-53032. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.13.5. This vulnerability affects the function syscore_resume of the file drivers/base/syscore.c. This manipulation causes denial of service.
This vulnerability is registered as CVE-2024-58090. The attack requires access to the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 5.15.90/6.1.7. Affected is the function put_cpu. This manipulation of the argument perpcu causes allocation of resources.
The identification of this vulnerability is CVE-2023-53029. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Linux Kernel up to 5.15.90/6.1.7. The impacted element is the function in_atomic in the library include/linux/sched/mm.h of the component Memory Allocation Handler. Executing manipulation can lead to allocation of resources.
This vulnerability is tracked as CVE-2023-53030. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability identified as problematic has been detected in Linux Kernel up to 5.4.228/5.10.163/5.15.88/6.1.6. This affects the function in_atomic of the component Performance Counters. The manipulation leads to state issue.
This vulnerability is listed as CVE-2023-53031. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 5.4.230/5.10.165/5.15.90/6.1.8. The affected element is an unknown function of the component RDMA. Performing manipulation results in infinite loop.
This vulnerability is known as CVE-2023-53026. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 5.10.164/5.15.89/6.1.7. The affected element is the function ieee80211_if_add. Executing manipulation can lead to memory leak.
The identification of this vulnerability is CVE-2023-53028. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 4.19.271/5.4.230/5.10.165/5.15.90/6.1.8. This affects the function bpf_ringbuf_output. The manipulation leads to type confusion.
This vulnerability is uniquely identified as CVE-2023-53024. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 5.15.90/6.1.8. Affected by this issue is the function nfsd4_ssc_setup_dul. Performing manipulation results in use after free.
This vulnerability is reported as CVE-2023-53025. The attacker must have access to the local network to execute the attack. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 5.15.90/6.1.8. Impacted is the function enetc_tx_onestep_tstamp. Such manipulation leads to deadlock.
This vulnerability is traded as CVE-2023-53022. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.8. The impacted element is the function local_cleanup of the component nfc. The manipulation leads to use after free.
This vulnerability is referenced as CVE-2023-53023. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Wade Graphic Design FANTSY. It has been classified as critical. Impacted is an unknown function. The manipulation leads to unrestricted upload.
This vulnerability is listed as CVE-2023-28699. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in Wade Graphic Design FANTSY. It has been declared as very critical. The affected element is an unknown function of the component URL Parameter Handler. The manipulation results in incorrect authorization.
This vulnerability is cataloged as CVE-2023-28698. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in OMICARD EDM. It has been classified as critical. This affects an unknown function. This manipulation causes unrestricted upload.
This vulnerability is tracked as CVE-2023-28700. The attack is restricted to local execution. No exploit exists.