Количество 46
Количество 46

CVE-2024-41090
In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090

CVE-2024-41090
In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090

CVE-2024-41090
In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090
CVE-2024-41090
In the Linux kernel, the following vulnerability has been resolved: t ...
GHSA-22mj-9hjg-cp82
In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090

BDU:2025-04193
Уязвимость компонента tap.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:1257-1
Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4)

SUSE-SU-2025:1252-1
Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4)

SUSE-SU-2025:1232-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

SUSE-SU-2025:1207-1
Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6)
ELSA-2024-12583
ELSA-2024-12583: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-12582
ELSA-2024-12582: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-12552
ELSA-2024-12552: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2024-12551
ELSA-2024-12551: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2024-12549
ELSA-2024-12549: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-12548
ELSA-2024-12548: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-12547
ELSA-2024-12547: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-12546
ELSA-2024-12546: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2025:1262-1
Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3)

SUSE-SU-2025:1260-1
Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-41090 In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090 | 0% Низкий | 11 месяцев назад | |
![]() | CVE-2024-41090 In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090 | CVSS3: 7.1 | 0% Низкий | 11 месяцев назад |
![]() | CVE-2024-41090 In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090 | 0% Низкий | 11 месяцев назад | |
CVE-2024-41090 In the Linux kernel, the following vulnerability has been resolved: t ... | 0% Низкий | 11 месяцев назад | ||
GHSA-22mj-9hjg-cp82 In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tap_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted. This is to drop any frame shorter than the Ethernet header size just like how tap_get_user() does. CVE: CVE-2024-41090 | 0% Низкий | 11 месяцев назад | ||
![]() | BDU:2025-04193 Уязвимость компонента tap.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.1 | 0% Низкий | 11 месяцев назад |
![]() | SUSE-SU-2025:1257-1 Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1252-1 Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1232-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1207-1 Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2 месяца назад | ||
ELSA-2024-12583 ELSA-2024-12583: Unbreakable Enterprise kernel security update (IMPORTANT) | 10 месяцев назад | |||
ELSA-2024-12582 ELSA-2024-12582: Unbreakable Enterprise kernel security update (IMPORTANT) | 10 месяцев назад | |||
ELSA-2024-12552 ELSA-2024-12552: Unbreakable Enterprise kernel-container security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2024-12551 ELSA-2024-12551: Unbreakable Enterprise kernel-container security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2024-12549 ELSA-2024-12549: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2024-12548 ELSA-2024-12548: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2024-12547 ELSA-2024-12547: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
ELSA-2024-12546 ELSA-2024-12546: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад | |||
![]() | SUSE-SU-2025:1262-1 Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 2 месяца назад | ||
![]() | SUSE-SU-2025:1260-1 Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 2 месяца назад |
Уязвимостей на страницу