On Wednesday, NVIDIA released updates to fix a critical vulnerability in its NVIDIA Container Toolkit, which, if exploited, could put a wide range of AI infrastructure and underlying data/secrets at risk.
On Wednesday, NVIDA released updates to fix a critical vulnerability in its NVIDIA Container Toolkit, which, if exploited, could put a wide range of AI infrastructure and underlying data/secrets at risk.
On Wednesday, NVIDA released updates to fix a critical vulnerability in its NVIDIA Container Toolkit, which, if exploited, could put a wide range of AI infrastructure and underlying data/secrets at risk.
A vulnerability classified as critical has been found in Post Form Plugin up to 2.8.11 on WordPress. Affected is an unknown function. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2024-8246. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.9.5 and classified as critical. This issue affects some unknown processing of the component xattr. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-40902. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.9.8. Affected is the function ib_umad. The manipulation leads to resource consumption.
This vulnerability is traded as CVE-2024-42145. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.9 and classified as critical. This issue affects the function delayed_work of the component libceph. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-42232. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.201/5.15.139/6.1.63/6.5.12/6.6.2. It has been rated as problematic. Affected by this issue is the function rpc_remove_pipedir. The manipulation leads to use after free.
This vulnerability is handled as CVE-2023-52803. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.9.5. This vulnerability affects the function set_bit of the component mpt3sas. The manipulation leads to allocation of resources.
This vulnerability was named CVE-2024-40901. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.