{"uuid": "41809e54-d1a2-4d30-b6e8-a19c0983a415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42091", "type": "seen", "source": "https://t.me/cvedetector/1907", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42091 - Oracle XE Linux Kernel Pointer Deref Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42091 \nPublished : July 29, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/xe: Check pat.ops before dumping PAT settings  \n  \nWe may leave pat.ops unset when running on brand new platform or  \nwhen running as a VF.  While the former is unlikely, the latter  \nis valid (future) use case and will cause NPD when someone will  \ntry to dump PAT settings by debugfs.  \n  \nIt's better to check pointer to pat.ops instead of specific .dump  \nhook, as we have this hook always defined for every .ops variant. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T21:19:26.000000Z"}