A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.6.25/6.8.1. This affects the function btrfs_page_mkwrite. The manipulation leads to deadlock.
This vulnerability is uniquely identified as CVE-2024-27080. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.82/6.6.22/6.7.10/6.8.1 and classified as problematic. This vulnerability affects the function d_invalidate of the file fs/dcache.c of the component pstore. The manipulation leads to privilege escalation.
This vulnerability was named CVE-2024-27389. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.8.1. Affected by this issue is the function gssx_dec_option_array of the component SUNRPC. The manipulation leads to memory leak.
This vulnerability is handled as CVE-2024-27388. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.8.1. This issue affects the function release_device of the component iommu. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2024-27079. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.8.1. This vulnerability affects the function tpg_alloc of the component v4l2-tpg. The manipulation leads to memory leak.
This vulnerability was named CVE-2024-27078. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.8.1. It has been classified as critical. This affects the function v4l2_m2m_register_entity of the component v4l2-mem2mem. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2024-27077. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in rust-openssl. Affected by this vulnerability is an unknown functionality of the component PKCS 1.5 RSA Encryption Padding Mode. The manipulation leads to observable timing discrepancy.
This vulnerability is known as CVE-2024-3296. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in FreeIPA. This vulnerability affects unknown code of the component HTTP Request Handler. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-1481. Access to the local network is required for this attack to succeed. Furthermore, there is an exploit available.
A vulnerability was found in Red Hat Directory Server 11/12 and classified as problematic. This issue affects some unknown processing of the component 389-ds-base LDAP Server. The manipulation of the argument userPassword leads to denial of service.
The identification of this vulnerability is CVE-2024-2199. The attack can only be initiated within the local network. There is no exploit available.
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. New Linux backdoor Plague bypasses auth via malicious PAM module China Presses Nvidia Over Alleged Backdoors […]
A vulnerability has been found in NVIDIA GPU Display Driver R535/R570/R575 on Windows and classified as problematic. This vulnerability affects unknown code. The manipulation leads to exposure of sensitive system information to an unauthorized control sphere.
This vulnerability was named CVE-2025-23287. Local access is required to approach this attack. There is no exploit available.
A vulnerability, which was classified as critical, was found in NVIDIA GPU Display Driver R575 on Windows/Linux. This affects an unknown part. The manipulation leads to improper validation of array index.
This vulnerability is uniquely identified as CVE-2025-23278. An attack has to be approached locally. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in NVIDIA GPU Display Driver R535/R570. Affected by this issue is some unknown functionality of the component Virtual GPU Manager. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2025-23290. The attack needs to be approached locally. There is no exploit available.
A vulnerability classified as critical was found in NVIDIA GPU Display Driver R535/R570. Affected by this vulnerability is an unknown functionality of the component Virtual GPU Manager. The manipulation leads to incorrect permission assignment.
This vulnerability is known as CVE-2025-23285. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability classified as problematic has been found in NVIDIA GPU Display Driver R535/R570/R575 on Windows. Affected is an unknown function of the component Installer. The manipulation leads to files or directories accessible.
This vulnerability is traded as CVE-2025-23276. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in NVIDIA GPU Display Driver R535/R570/R575 on Windows/Linux. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2025-23286. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in NVIDIA GPU Display Driver R570. It has been declared as critical. This vulnerability affects unknown code of the component Virtual GPU Manager. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2025-23284. An attack has to be approached locally. There is no exploit available.
A vulnerability was found in NVIDIA GPU Display Driver R535/R570 on Linux. It has been classified as critical. This affects an unknown part of the component Virtual GPU Manager. The manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2025-23283. The attack needs to be approached locally. There is no exploit available.