Логотип exploitDog
bind:CVE-2024-41091
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-41091

Количество 34

Количество 34

ubuntu логотип

CVE-2024-41091

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

EPSS: Низкий
redhat логотип

CVE-2024-41091

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2024-41091

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

EPSS: Низкий
debian логотип

CVE-2024-41091

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: t ...

EPSS: Низкий
github логотип

GHSA-x5q2-qqwh-x9rv

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

EPSS: Низкий
fstec логотип

BDU:2025-04173

11 месяцев назад

Уязвимость компонента tun.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12583

10 месяцев назад

ELSA-2024-12583: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12582

10 месяцев назад

ELSA-2024-12582: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12552

11 месяцев назад

ELSA-2024-12552: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12551

11 месяцев назад

ELSA-2024-12551: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12549

11 месяцев назад

ELSA-2024-12549: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12548

11 месяцев назад

ELSA-2024-12548: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12547

11 месяцев назад

ELSA-2024-12547: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12546

11 месяцев назад

ELSA-2024-12546: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12571

11 месяцев назад

ELSA-2024-12571: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12570

11 месяцев назад

ELSA-2024-12570: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-5928

10 месяцев назад

ELSA-2024-5928: kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12585

10 месяцев назад

ELSA-2024-12585: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12584

10 месяцев назад

ELSA-2024-12584: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12581

10 месяцев назад

ELSA-2024-12581: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-41091

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

0%
Низкий
11 месяцев назад
redhat логотип
CVE-2024-41091

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

CVSS3: 7.1
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2024-41091

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-41091

In the Linux kernel, the following vulnerability has been resolved: t ...

0%
Низкий
11 месяцев назад
github логотип
GHSA-x5q2-qqwh-x9rv

In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet header although it can be less than ETH_HLEN. Once transmitted, this could either cause out-of-bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata. In the alternative path, tun_get_user() already prohibits short frame which has the length less than Ethernet header size from being transmitted for IFF_TAP. This is to drop any frame shorter than the Ethernet header size just like how tun_get_user() does. CVE: CVE-2024-41091

0%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-04173

Уязвимость компонента tun.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
11 месяцев назад
oracle-oval логотип
ELSA-2024-12583

ELSA-2024-12583: Unbreakable Enterprise kernel security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2024-12582

ELSA-2024-12582: Unbreakable Enterprise kernel security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2024-12552

ELSA-2024-12552: Unbreakable Enterprise kernel-container security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-12551

ELSA-2024-12551: Unbreakable Enterprise kernel-container security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-12549

ELSA-2024-12549: Unbreakable Enterprise kernel security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-12548

ELSA-2024-12548: Unbreakable Enterprise kernel security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-12547

ELSA-2024-12547: Unbreakable Enterprise kernel security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-12546

ELSA-2024-12546: Unbreakable Enterprise kernel security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-12571

ELSA-2024-12571: Unbreakable Enterprise kernel security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-12570

ELSA-2024-12570: Unbreakable Enterprise kernel security update (IMPORTANT)

11 месяцев назад
oracle-oval логотип
ELSA-2024-5928

ELSA-2024-5928: kernel security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2024-12585

ELSA-2024-12585: Unbreakable Enterprise kernel-container security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2024-12584

ELSA-2024-12584: Unbreakable Enterprise kernel-container security update (IMPORTANT)

10 месяцев назад
oracle-oval логотип
ELSA-2024-12581

ELSA-2024-12581: Unbreakable Enterprise kernel security update (IMPORTANT)

10 месяцев назад

Уязвимостей на страницу