A vulnerability was found in Linux Kernel up to 6.6.122/6.12.68/6.18.8 and classified as critical. This issue affects some unknown processing of the component mlx5e. Executing a manipulation can lead to null pointer dereference.
This vulnerability is tracked as CVE-2026-23173. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.18.9 and classified as critical. This vulnerability affects unknown code of the component dmem. Performing a manipulation results in null pointer dereference.
This vulnerability is identified as CVE-2026-23183. The attack can only be performed from the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.161/6.6.121/6.12.67/6.18.7. This affects the function nsim_bpf_create_prog of the component Netdevsim Driver. Such manipulation leads to protection mechanism failure.
This vulnerability is referenced as CVE-2026-23126. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.18.9. Affected by this issue is the function vlan_for_each of the file net/8021q/vlan_core.c. This manipulation causes reachable assertion.
The identification of this vulnerability is CVE-2026-23175. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.6.123/6.12.69/6.18.9. Affected by this vulnerability is the function fib6_add_rt2node of the file net/ipv6/ip6_fib.c of the component ipv6. The manipulation results in privilege escalation.
This vulnerability was named CVE-2026-23200. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Linux Kernel up to 6.18.7. Affected is an unknown function of the component igc. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2026-23122. The attack can only be initiated within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.18.9. This impacts the function netdev_lock_ops/netdev_unlock_ops of the component linkwatch. Executing a manipulation can lead to use after free.
This vulnerability is handled as CVE-2026-23192. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.18.8. This affects the function xdp_pass. Performing a manipulation results in use after free.
This vulnerability is known as CVE-2026-23171. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.18.8. The impacted element is the function nfc_llcp_send_ui_frame. Such manipulation leads to memory leak.
This vulnerability is traded as CVE-2026-23150. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.18.7. The affected element is the function kmalloc_nolock of the component slab. This manipulation causes privilege escalation.
This vulnerability appears as CVE-2026-23134. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.18.8. Impacted is the function rocker_world_port_post_fini. The manipulation results in memory leak.
This vulnerability is reported as CVE-2026-23164. The attacker must have access to the local network to execute the attack. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.18.8. It has been rated as critical. This issue affects the function btrfs_compress_filemap_get_folio. The manipulation leads to buffer overflow.
This vulnerability is documented as CVE-2026-23147. The attack requires being on the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.18.8. It has been declared as critical. This vulnerability affects the function drm_gem_change_handle_ioctl of the component drm. Executing a manipulation can lead to privilege escalation.
This vulnerability is registered as CVE-2026-23149. The attack requires access to the local network. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.68/6.18.8. It has been classified as critical. This affects the function xa_cmpxchg_irq. Performing a manipulation results in denial of service.
This vulnerability is cataloged as CVE-2026-23161. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.6.122/6.12.68/6.18.8 and classified as critical. Affected by this issue is the function is_user_task of the component perf. Such manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-23159. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.161/6.6.122/6.12.68/6.18.8 and classified as critical. Affected by this vulnerability is the function efivar_entry_get of the component efivarfs. This manipulation causes uninitialized pointer.
This vulnerability is tracked as CVE-2026-23156. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.18.8. Affected is an unknown function of the component wifi. The manipulation results in memory corruption.
This vulnerability is identified as CVE-2026-23152. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.18.8. This impacts the function hci_uart_set_proto of the component Bluetooth. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2026-23146. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.161/6.6.121/6.12.66/6.18.6. This affects an unknown function of the file mm/damon/sysfs of the component DAMON Sysfs Interface. Executing a manipulation can lead to denial of service.
The identification of this vulnerability is CVE-2026-23144. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.