2024-08-20 23:58:14 +00:00
{
"id" : "CVE-2024-43861" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-08-20T22:15:04.917" ,
2024-08-21 14:03:17 +00:00
"lastModified" : "2024-08-21T12:30:33.697" ,
"vulnStatus" : "Awaiting Analysis" ,
2024-08-20 23:58:14 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: qmi_wwan: fix memory leak for not ip packets\n\nFree the unused skb when not ip packets arrive."
2024-08-21 14:03:17 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net:usb:qmi_wwan: repara la p\u00e9rdida de memoria para paquetes que no son ip Libera el skb no utilizado cuando no llegan paquetes ip."
2024-08-20 23:58:14 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://git.kernel.org/stable/c/37c093449704017870604994ba9b813cdb9475a4" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/3c90a69533b5bba73401ef884d033ea49ee99662" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/7ab107544b777c3bd7feb9fe447367d8edd5b202" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/c4251a3deccad852b27e60625f31fba6cc14372f" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/c6c5b91424fafc0f83852d961c10c7e43a001882" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/da518cc9b64df391795d9952aed551e0f782e446" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/e87f52225e04a7001bf55bbd7a330fa4252327b5" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/f2c353227de14b0289298ffc3ba92058c4768384" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}