2024-12-29 11:03:43 +00:00
{
"id" : "CVE-2024-56716" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-12-29T09:15:06.777" ,
2025-01-09 17:04:14 +00:00
"lastModified" : "2025-01-09T16:16:23.387" ,
2025-01-05 03:03:46 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-12-29 11:03:43 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnetdevsim: prevent bad user input in nsim_dev_health_break_write()\n\nIf either a zero count or a large one is provided, kernel can crash."
2025-01-05 03:03:46 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netdevsim: evitar entradas incorrectas del usuario en nsim_dev_health_break_write() Si se proporciona un recuento cero o uno grande, el kernel puede bloquearse."
2024-12-29 11:03:43 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://git.kernel.org/stable/c/470c5ecbac2f19b1cdee2a6ce8d5650c3295c94b" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
2025-01-09 17:04:14 +00:00
{
"url" : "https://git.kernel.org/stable/c/81bdfcd6e6a998e219c9dd49ec7291c2e0594bbc" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
2024-12-29 11:03:43 +00:00
{
"url" : "https://git.kernel.org/stable/c/8e9ef6bdf71bf25f4735e0230ce1919de8985835" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
2025-01-09 17:04:14 +00:00
{
"url" : "https://git.kernel.org/stable/c/b3a6daaf7cfb2de37b89fd7a5a2ad4ea9aa3e181" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
2024-12-29 11:03:43 +00:00
{
"url" : "https://git.kernel.org/stable/c/d10321be26ff9e9e912697e9e8448099654ff561" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/ee76746387f6233bdfa93d7406990f923641568f" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}