In the Linux kernel, the following vulnerability has been resolved:
usbnet: ipheth: do not stop RX on failing RX callback
RX callbacks can fail for multiple reasons:
* Payload too short
* Payload formatted incorrecly (e.g. bad NCM framing)
* Lack of memory
None of these should cause the driver to seize up.
Make such failures non-critical and continue processing further
incoming URBs.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-09-27 13:15
Updated : 2024-10-03 15:36
NVD link : CVE-2024-46861
Mitre link : CVE-2024-46861
CVE.ORG link : CVE-2024-46861
JSON object : View
Products Affected
linux
- linux_kernel
CWE