• CVE-2024-49997

发布时间: 2024年12月6日

修改时间: 2024年12月13日

概要

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.

CVSS v3 指标

NVD openEuler
Confidentiality High High
Attack Vector Network Network
CVSS评分 7.5 7.5
Attack Complexity Low Low
Privileges Required None None
Scope Unchanged Unchanged
Integrity None None
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4996 kernel security update 2025年7月20日

影响产品

产品 状态
KY3.5.2 kernel Fixed
V6 kernel Fixed
KY3.5.3 kernel Fixed