In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: fix overwriting ct original tuple for ICMPv6
OVS_PACKET_CMD_EXECUTE has 3 main attributes:
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/7c988176b6c16c516474f6fceebe0f055af5eb56 (6.10-rc1)
git.kernel.org/stable/c/0b532f59437f688563e9c58bdc1436fefa46e3b5
git.kernel.org/stable/c/431e9215576d7b728f3f53a704d237a520092120
git.kernel.org/stable/c/483eb70f441e2df66ade78aa7217e6e4caadfef3
git.kernel.org/stable/c/5ab6aecbede080b44b8e34720ab72050bf1e6982
git.kernel.org/stable/c/6a51ac92bf35d34b4996d6eb67e2fe469f573b11
git.kernel.org/stable/c/78741b4caae1e880368cb2f5110635f3ce45ecfd
git.kernel.org/stable/c/7c988176b6c16c516474f6fceebe0f055af5eb56
git.kernel.org/stable/c/9ec8b0ccadb908d92f7ee211a4eff05fd932f3f6
git.kernel.org/stable/c/d73fb8bddf89503c9fae7c42e50d44c89909aad6
launchpad.net/bugs/cve/CVE-2024-38558
nvd.nist.gov/vuln/detail/CVE-2024-38558
security-tracker.debian.org/tracker/CVE-2024-38558
www.cve.org/CVERecord?id=CVE-2024-38558