Executive Summary

Informations
Name CVE-2024-46854 First vendor Publication 2024-09-27
Vendor Cve Last vendor Modification 2024-11-08

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Overall CVSS Score 7.1
Base Score 7.1 Environmental Score 7.1
impact SubScore 5.2 Temporal Score 7.1
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: dpaa: Pad packets to ETH_ZLEN

When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running

$ ping -s 11 destination

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46854

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3678

Sources (Detail)

https://git.kernel.org/stable/c/1f31f51bfc8214a6deaac2920e6342cb9d019133
https://git.kernel.org/stable/c/34fcac26216ce17886af3eb392355b459367af1a
https://git.kernel.org/stable/c/38f5db5587c0ee53546b28c50ba128253181ac83
https://git.kernel.org/stable/c/cbd7ec083413c6a2e0c326d49e24ec7d12c7a9e0
https://git.kernel.org/stable/c/cd5b9d657ecd44ad5f254c3fea3a6ab1cf0e2ef7
https://git.kernel.org/stable/c/ce8eabc912fe9b9a62be1a5c6af5ad2196e90fc2
https://git.kernel.org/stable/c/dc43a096cfe65b5c32168313846c5cd135d08f1d
https://git.kernel.org/stable/c/f43190e33224c49e1c7ebbc25923ff400d87ec00
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Date Informations
2025-03-29 03:40:52
  • Multiple Updates
2025-03-28 13:45:13
  • Multiple Updates
2025-03-28 03:18:54
  • Multiple Updates
2025-03-19 03:14:13
  • Multiple Updates
2025-03-18 03:27:10
  • Multiple Updates
2025-03-14 03:14:27
  • Multiple Updates
2025-03-06 14:10:59
  • Multiple Updates
2025-02-22 03:24:33
  • Multiple Updates
2025-01-08 03:05:33
  • Multiple Updates
2025-01-07 03:05:06
  • Multiple Updates
2024-12-25 03:03:44
  • Multiple Updates
2024-12-12 03:06:40
  • Multiple Updates
2024-11-23 03:03:36
  • Multiple Updates
2024-11-22 03:01:46
  • Multiple Updates
2024-11-20 03:00:05
  • Multiple Updates
2024-11-13 21:21:59
  • Multiple Updates
2024-11-09 00:28:25
  • Multiple Updates
2024-11-08 21:28:06
  • Multiple Updates
2024-10-26 00:29:01
  • Multiple Updates
2024-10-25 21:29:55
  • Multiple Updates
2024-10-25 00:29:04
  • Multiple Updates
2024-10-24 17:28:10
  • Multiple Updates
2024-10-22 21:28:11
  • Multiple Updates
2024-10-17 21:27:36
  • Multiple Updates
2024-10-04 21:27:29
  • Multiple Updates
2024-09-30 17:27:26
  • Multiple Updates
2024-09-27 17:27:23
  • First insertion