A vulnerability described as critical has been identified in Linux Kernel up to 6.6.25/6.8.1. This vulnerability affects the function btrfs_page_mkwrite. Such manipulation leads to deadlock.
This vulnerability is traded as CVE-2024-27080. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.82/6.6.22/6.7.10/6.8.1. This issue affects the function d_invalidate of the file fs/dcache.c of the component pstore. Performing a manipulation results in double free.
This vulnerability is known as CVE-2024-27389. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.8.1. This affects the function gssx_dec_option_array of the component SUNRPC. This manipulation causes memory leak.
This vulnerability appears as CVE-2024-27388. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.8.1. This issue affects the function release_device of the component iommu. Executing a manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2024-27079. The attack needs to be done within the local network. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.8.1. This vulnerability affects the function tpg_alloc of the component v4l2-tpg. Performing a manipulation results in memory leak.
This vulnerability was named CVE-2024-27078. The attack needs to be approached within the local network. There is no available exploit.
It is advisable to upgrade the affected component.
Rome’s La Sapienza University was hit by a cyberattack that disrupted IT systems and caused widespread operational issues. Since February 2, Rome’s La Sapienza University, one of the most important Italian universities, has been offline due to a cyberattack. For days, students have been unable to book exams, check tuition payments, or access faculty contacts. […]
A vulnerability classified as critical was found in Linux Kernel up to 6.8.1. This affects the function stv0367_writereg of the file drivers/media/dvb-frontends/stv0367.c of the component dvb-frontends. Such manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-27075. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.8.1. It has been declared as critical. This affects the function v4l2_m2m_register_entity of the component v4l2-mem2mem. Such manipulation leads to memory leak.
This vulnerability is listed as CVE-2024-27077. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.8.1. It has been classified as critical. The impacted element is the function v4l2_ctrl_handler of the component imx. This manipulation causes memory leak.
This vulnerability is tracked as CVE-2024-27076. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Linux Kernel up to 6.8.1 and classified as critical. The affected element is the function go7007_load_encoder of the component Media. The manipulation results in memory leak.
This vulnerability is identified as CVE-2024-27074. The attack can only be performed from the local network. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.8.1. Affected by this issue is the function budget_av_attach of the component ttpci. This manipulation causes memory leak.
This vulnerability is handled as CVE-2024-27073. The attack can only be done within the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.8.1. Affected by this vulnerability is the function usbtv_video_free of the component Media. The manipulation results in deadlock.
This vulnerability is known as CVE-2024-27072. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.8.1. Affected is the function f2fs_filemap_fault in the library lib/dump_stack.c. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-27070. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.8.1 and classified as critical. Impacted is the function hx8357_probe of the component backlight. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2024-27071. The attack needs to be initiated within the local network. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Tenda AC8 16.03.33.05. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set of the component Embedded Httpd Service. This manipulation of the argument timeZone causes buffer overflow.
This vulnerability is registered as CVE-2026-2203. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability classified as critical was found in Tenda AC8 16.03.33.05. Affected is the function fromSetWifiGusetBasic of the file /goform/WifiGuestSet of the component httpd. The manipulation of the argument shareSpeed results in buffer overflow.
This vulnerability is cataloged as CVE-2026-2202. The attack may be launched remotely. Furthermore, there is an exploit available.