{ "id": "CVE-2024-46861", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-27T13:15:17.563", "lastModified": "2024-09-30T12:45:57.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: ipheth: do not stop RX on failing RX callback\n\nRX callbacks can fail for multiple reasons:\n\n* Payload too short\n* Payload formatted incorrecly (e.g. bad NCM framing)\n* Lack of memory\n\nNone of these should cause the driver to seize up.\n\nMake such failures non-critical and continue processing further\nincoming URBs." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usbnet: ipheth: no detiene RX en caso de error en la devoluci\u00f3n de llamada RX Las devoluciones de llamada RX pueden fallar por m\u00faltiples razones: * Payload demasiado corto * Payload formateado incorrectamente (por ejemplo, mala estructura de NCM) * Falta de memoria Ninguna de estas deber\u00eda provocar que el controlador se bloquee. Haga que estas fallas no sean cr\u00edticas y contin\u00fae procesando m\u00e1s URB entrantes." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/08ca800b0cd56d5e26722f68b18bbbf6840bf44b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/4d1cfa3afb8627435744ecdc6d8b58bc72ee0f4c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/74efed51e0a4d62f998f806c307778b47fc73395", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }