CVE-2024-50185
Published Nov 8, 2024
Last updated 9 days ago
Overview
- Description
- In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS options, consistently hitting a few warning in the data path. Use DEBUG_NET assertions, to avoid the splat on some builds and handle consistently the error, dumping related MIBs and performing fallback and/or reset according to the subflow type.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Awaiting Analysis
Social media
- Hype score
- Not currently trending
CVE-2024-50185 Consistent Error Handling in MPTCP DSS Corruption Vulnerability ... https://t.co/T6sXX2cfGn Customizable Vulnerability Alerts: https://t.co/U7998fz7yk
@VulmonFeeds
8 Nov 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-50185 In the Linux kernel, the following vulnerability has been resolved: mptcp: handle consistently DSS corruption Bugged peer implementation can send corrupted DSS opti… https://t.co/XPFP9FXSLQ
@CVEnew
8 Nov 2024
349 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes