A vulnerability was found in Linux Kernel up to 5.15.163/6.1.101/6.6.42/6.9.11/6.10.1 and classified as problematic. Affected by this issue is some unknown functionality of the component ntfs3. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2024-41019. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.9.7. This affects the function cxl_find_nvdimm_bridge. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-41085. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.6.36/6.9.7. Affected is the function vmalloc of the component fbdev-dma. The manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2024-41094. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.1.100/6.6.41/6.9.10. This vulnerability affects the function ondemand_id of the component cachefiles. The manipulation leads to insufficiently random values.
This vulnerability was named CVE-2024-41075. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.1.97/6.6.38/6.9.8. It has been rated as problematic. Affected by this issue is the function nmi_enter/nmi_exit. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2024-42126. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.36/6.9.7 and classified as critical. Affected by this vulnerability is the function drm_file_update_pid of the component drm_file. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-39486. The attack needs to be done within the local network. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.7. It has been rated as problematic. Affected by this issue is the function bch2_sb_downgrade_validate of the component bcachefs. The manipulation leads to algorithm downgrade.
This vulnerability is handled as CVE-2024-41086. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.6.40/6.9.9. Affected by this vulnerability is the function crst_table_free. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-42235. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.9.9. Affected by this issue is some unknown functionality of the component cachestat. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-41033. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.9.10. Affected by this vulnerability is the function dml2_calculate_rq_and_dlg_params of the component AMD Display. The manipulation leads to improper validation of array index.
This vulnerability is known as CVE-2024-41061. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.38/6.9.8. It has been declared as critical. This vulnerability affects the function mtk_vcodec_mem_free of the component mediatek. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2023-52888. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Setting Handler. The manipulation leads to insufficiently random values.
This vulnerability is known as CVE-2024-42091. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.8. It has been classified as critical. Affected is the function dml_core_mode_programming of the component AMD Display. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2024-42227. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.8 and classified as problematic. Affected by this issue is the function fs_bdev_thaw. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2024-42149. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
Making the Case for Stronger Mid-Market Cybersecurity Cybersecurity is an ever-evolving field. Verizon's Trusted Connection provides strong, easy-to-manage security for mid-market organizations. With a focus on usability, adaptability and comprehensive protection, Trusted Connection can help safeguard your organization's operations today, and in the future.
CIO Alex Gallo on Balancing Digital Change, Security and Continuous Learning Alex Gallo, CyberEdBoard member and CIO, shared how he drives secure digital transformation by balancing AI integration with cybersecurity, fostering a security-first culture, and emphasizing continuous learning across his teams and the organization’s leadership.