| ID | CVE-2024-50185 | ||||||
| Sažetak | In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type. | ||||||
| Reference | 
          
  | 
      ||||||
| CVSS | 
          
  | 
      ||||||
| Pristup | 
        
  | 
    ||||||
| Impact | 
        
  | 
    ||||||
| CVSS vektor | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | ||||||
| Zadnje važnije ažuriranje | 01-10-2025 - 21:16 | ||||||
| Objavljeno | 08-11-2024 - 06:15 | 

