Количество 20
Количество 20

CVE-2024-46854
In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination

CVE-2024-46854
In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination

CVE-2024-46854
In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination

CVE-2024-46854
CVE-2024-46854
In the Linux kernel, the following vulnerability has been resolved: n ...
GHSA-2r8q-2j9h-3chh
In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination

BDU:2024-08517
Уязвимость функции dpaa_start_xmit() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

ROS-20250310-01
Множественные уязвимости kernel-lt

SUSE-SU-2024:3591-1
Security update for the Linux Kernel

SUSE-SU-2024:3559-1
Security update for the Linux Kernel

SUSE-SU-2024:3566-1
Security update for the Linux Kernel
ELSA-2024-12884
ELSA-2024-12884: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2024:3587-1
Security update for the Linux Kernel

SUSE-SU-2024:3985-1
Security update for the Linux Kernel
ELSA-2024-12887
ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2024:3986-1
Security update for the Linux Kernel

SUSE-SU-2024:3984-1
Security update for the Linux Kernel

SUSE-SU-2024:4364-1
Security update for the Linux Kernel

SUSE-SU-2024:4387-1
Security update for the Linux Kernel

SUSE-SU-2024:4318-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-46854 In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-46854 In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-46854 In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад |
![]() | CVSS3: 7.1 | 0% Низкий | 7 месяцев назад | |
CVE-2024-46854 In the Linux kernel, the following vulnerability has been resolved: n ... | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад | |
GHSA-2r8q-2j9h-3chh In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад | |
![]() | BDU:2024-08517 Уязвимость функции dpaa_start_xmit() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад |
![]() | ROS-20250310-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 3 месяца назад | |
![]() | SUSE-SU-2024:3591-1 Security update for the Linux Kernel | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3559-1 Security update for the Linux Kernel | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3566-1 Security update for the Linux Kernel | 8 месяцев назад | ||
ELSA-2024-12884 ELSA-2024-12884: Unbreakable Enterprise kernel security update (IMPORTANT) | 6 месяцев назад | |||
![]() | SUSE-SU-2024:3587-1 Security update for the Linux Kernel | 8 месяцев назад | ||
![]() | SUSE-SU-2024:3985-1 Security update for the Linux Kernel | 7 месяцев назад | ||
ELSA-2024-12887 ELSA-2024-12887: Unbreakable Enterprise kernel security update (IMPORTANT) | 6 месяцев назад | |||
![]() | SUSE-SU-2024:3986-1 Security update for the Linux Kernel | 7 месяцев назад | ||
![]() | SUSE-SU-2024:3984-1 Security update for the Linux Kernel | 7 месяцев назад | ||
![]() | SUSE-SU-2024:4364-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4387-1 Security update for the Linux Kernel | 6 месяцев назад | ||
![]() | SUSE-SU-2024:4318-1 Security update for the Linux Kernel | 6 месяцев назад |
Уязвимостей на страницу