Количество 13
Количество 13
CVE-2024-50185
In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type.
CVE-2024-50185
In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type.
CVE-2024-50185
In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type.
CVE-2024-50185
mptcp: handle consistently DSS corruption
CVE-2024-50185
In the Linux kernel, the following vulnerability has been resolved: m ...
GHSA-q7m5-gh3m-8v66
In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type.
BDU:2025-03491
Уязвимость компонента mptcp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20250318-01
Множественные уязвимости kernel-lt
SUSE-SU-2025:0784-1
Security update for the Linux Kernel
SUSE-SU-2025:0955-1
Security update for the Linux Kernel
SUSE-SU-2025:0856-1
Security update for the Linux Kernel
SUSE-SU-2025:0847-1
Security update for the Linux Kernel
ELSA-2024-12887
ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-50185 In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-50185 In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-50185 In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-50185 mptcp: handle consistently DSS corruption | CVSS3: 5.5 | 0% Низкий | 11 месяцев назад | |
CVE-2024-50185 In the Linux kernel, the following vulnerability has been resolved: m ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
GHSA-q7m5-gh3m-8v66 In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
BDU:2025-03491 Уязвимость компонента mptcp ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
ROS-20250318-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 8 месяцев назад | ||
SUSE-SU-2025:0784-1 Security update for the Linux Kernel | 9 месяцев назад | |||
SUSE-SU-2025:0955-1 Security update for the Linux Kernel | 8 месяцев назад | |||
SUSE-SU-2025:0856-1 Security update for the Linux Kernel | 8 месяцев назад | |||
SUSE-SU-2025:0847-1 Security update for the Linux Kernel | 8 месяцев назад | |||
ELSA-2024-12887 ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT) | 11 месяцев назад |
Уязвимостей на страницу