mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
37 lines
1.8 KiB
JSON
37 lines
1.8 KiB
JSON
{
|
|
"id": "CVE-2024-41043",
|
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
"published": "2024-07-29T15:15:12.710",
|
|
"lastModified": "2024-11-21T09:32:07.613",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_queue: drop bogus WARN_ON\n\nHappens when rules get flushed/deleted while packet is out, so remove\nthis WARN_ON.\n\nThis WARN exists in one form or another since v4.14, no need to backport\nthis to older releases, hence use a more recent fixes tag."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nfnetlink_queue: drop bogus WARN_ON Ocurre cuando las reglas se vac\u00edan/eliminan mientras el paquete est\u00e1 fuera, as\u00ed que elimine este WARN_ON. Esta ADVERTENCIA existe de una forma u otra desde la versi\u00f3n 4.14, no es necesario realizar un backport a versiones anteriores, por lo tanto, utilice una etiqueta de correcciones m\u00e1s reciente."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/631a4b3ddc7831b20442c59c28b0476d0704c9af",
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/86858da8335db48bde9be02abd7156a69d622e86",
|
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/631a4b3ddc7831b20442c59c28b0476d0704c9af",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/86858da8335db48bde9be02abd7156a69d622e86",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |