33 lines
1.7 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-46861",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:17.563",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: ipheth: do not stop RX on failing RX callback\n\nRX callbacks can fail for multiple reasons:\n\n* Payload too short\n* Payload formatted incorrecly (e.g. bad NCM framing)\n* Lack of memory\n\nNone of these should cause the driver to seize up.\n\nMake such failures non-critical and continue processing further\nincoming URBs."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: ipheth: no detiene RX en caso de error en la devoluci\u00f3n de llamada RX Las devoluciones de llamada RX pueden fallar por m\u00faltiples razones: * Payload demasiado corto * Payload formateado incorrectamente (por ejemplo, mala estructura de NCM) * Falta de memoria Ninguna de estas deber\u00eda provocar que el controlador se bloquee. Haga que estas fallas no sean cr\u00edticas y contin\u00fae procesando m\u00e1s URB entrantes."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/08ca800b0cd56d5e26722f68b18bbbf6840bf44b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4d1cfa3afb8627435744ecdc6d8b58bc72ee0f4c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/74efed51e0a4d62f998f806c307778b47fc73395",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}