MAGA 阵营在马斯克(Elon Musk)的 X 平台爆发“内战”。特朗普的 MAGA 阵营以反移民立场著称,然而马斯克却想要更多的印度廉价 IT 劳工,这激怒了 Laura Loomer 等 MAGA 名人,她通过其 X 账号抨击了马斯克,结果是她的蓝标被马斯克移除,付费订阅也被马斯克取消,这限制了她的推文文字数量。Laura Loomer 抨击马斯克是科技寡头,称这一行为是反美国的。
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.1.119/6.6.63/6.11.10/6.12.1. Affected is the function cppc_get_cpu_cost of the component cpufreq. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2024-53230. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.1. This issue affects the function bfad_im_module_exit of the component scsi. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-53227. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.12.1. This vulnerability affects the function hns_roce_map_mr_sg of the component RDMA. The manipulation of the argument sg_offset leads to null pointer dereference.
This vulnerability was named CVE-2024-53226. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.12.1. This affects the function max_n_shift of the component tegra241-cmdqv. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-53225. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.63/6.11.10/6.12.1. It has been rated as critical. Affected by this issue is the function rt2880_xtal_recalc_rate of the file drivers/clk/ralink/clk-mtmips.c. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-53223. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.10/6.12.1. It has been declared as critical. Affected by this vulnerability is the function ivpu_send_receive_internal of the component accel. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2024-56540. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1. It has been classified as critical. Affected is an unknown function of the file drivers/net/wireless/marvell/mwifiex/scan.c of the component mwifiex. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2024-56539. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.12.1 and classified as problematic. This issue affects the function snd_card_free_when_closed of the component ALSA. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-56533. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.12.1 and classified as problematic. This vulnerability affects the function snd_card_free_when_closed of the component ALSA. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2024-56531. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.12.1. This affects the function snd_card_free_when_closed of the component ALSA. The manipulation leads to infinite loop.
This vulnerability is uniquely identified as CVE-2024-56532. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.