{"vulnerability": "CVE-2024-4109", "sightings": [{"uuid": "99d3c11e-451c-449c-94b1-8b7c86766e50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4109", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113639063463720962", "content": "", "creation_timestamp": "2024-12-12T09:08:19.395307Z"}, {"uuid": "b06e57ab-f06e-4535-bf34-a039ffc6a906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41092", "type": "seen", "source": "https://bsky.app/profile/gcpweekly.bsky.social/post/3lndbn7ih6n2z", "content": "", "creation_timestamp": "2025-04-21T13:32:31.316782Z"}, {"uuid": "c6cc7079-b4a9-42c1-8194-2831c1f508ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4109", "type": "seen", "source": "https://gist.github.com/stephankoelle/684e7a52452eba633d1a11c02c696744", "content": "", "creation_timestamp": "2025-06-17T09:32:56.000000Z"}, {"uuid": "104200f2-4fa5-4e49-8a40-6cd8e49282fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41091", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "fa84272a-5c32-4a05-b7c4-00f6fe31f6c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41095", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "8622a085-07db-48aa-b067-4e9ae05fdb0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41097", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "2f531b7c-407e-4f69-9c32-ec651ce1737d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41090", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "6ad3d0ad-4368-4377-b6d8-e450fcd23f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41092", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "da08a327-fc49-4d0b-b622-6c574be7b4ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-41093", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "44a58692-413c-443b-8e0b-658e9f23e31a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4109", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2010", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4109\n\ud83d\udd39 Description: A flaw was found in Undertow. An HTTP request header value from a previous stream may be incorrectly reused for a request associated with a subsequent stream on the same HTTP/2 connection. This issue can potentially lead to information leakage between requests.\n\ud83d\udccf Published: 2024-12-12T09:04:50.299Z\n\ud83d\udccf Modified: 2025-01-16T19:51:57.505Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:10927\n2. https://access.redhat.com/errata/RHSA-2024:10928\n3. https://access.redhat.com/errata/RHSA-2024:10929\n4. https://access.redhat.com/errata/RHSA-2024:10933\n5. https://access.redhat.com/errata/RHSA-2024:11559\n6. https://access.redhat.com/errata/RHSA-2024:11560\n7. https://access.redhat.com/errata/RHSA-2024:11570\n8. https://access.redhat.com/security/cve/CVE-2024-4109\n9. https://bugzilla.redhat.com/show_bug.cgi?id=2272325", "creation_timestamp": "2025-01-16T19:55:49.000000Z"}, {"uuid": "80e9acf1-b18a-4038-8e7c-e07434339ad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4109", "type": "seen", "source": "https://t.me/cvedetector/12754", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-4109 - Undertow HTTP Header Reuse Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-4109 \nPublished : Dec. 12, 2024, 9:15 a.m. | 43\u00a0minutes ago \nDescription : A flaw was found in Undertow. An HTTP request header value from a previous stream may be incorrectly reused for a request associated with a subsequent stream on the same HTTP/2 connection. This issue can potentially lead to information leakage between requests. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T11:19:21.000000Z"}, {"uuid": "1b8a2907-9f07-4f2c-99e0-861dad68f8a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41090", "type": "seen", "source": "https://t.me/cvedetector/1818", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41090 - Linux Tap Corrupted SKB Network Header Out-of-Bounds Access\", \n  \"Content\": \"CVE ID : CVE-2024-41090 \nPublished : July 29, 2024, 7:15 a.m. | 17\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntap: add missing verification for short frame  \n  \nThe cited commit missed to check against the validity of the frame length  \nin the tap_get_user_xdp() path, which could cause a corrupted skb to be  \nsent downstack. Even before the skb is transmitted, the  \ntap_get_user_xdp()--&gt;skb_set_network_header() may assume the size is more  \nthan ETH_HLEN. Once transmitted, this could either cause out-of-bound  \naccess beyond the actual length, or confuse the underlayer with incorrect  \nor inconsistent header length in the skb metadata.  \n  \nIn the alternative path, tap_get_user() already prohibits short frame which  \nhas the length less than Ethernet header size from being transmitted.  \n  \nThis is to drop any frame shorter than the Ethernet header size just like  \nhow tap_get_user() does.  \n  \nCVE: CVE-2024-41090 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T09:36:08.000000Z"}, {"uuid": "0c65215d-5d43-4b19-87c2-0dd4187cf9dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41091", "type": "seen", "source": "https://t.me/cvedetector/1816", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41091 - Linux TUN Network Stack Ethernet Header Length Validation Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-41091 \nPublished : July 29, 2024, 7:15 a.m. | 17\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ntun: add missing verification for short frame  \n  \nThe cited commit missed to check against the validity of the frame length  \nin the tun_xdp_one() path, which could cause a corrupted skb to be sent  \ndownstack. Even before the skb is transmitted, the  \ntun_xdp_one--&gt;eth_type_trans() may access the Ethernet header although it  \ncan be less than ETH_HLEN. Once transmitted, this could either cause  \nout-of-bound access beyond the actual length, or confuse the underlayer  \nwith incorrect or inconsistent header length in the skb metadata.  \n  \nIn the alternative path, tun_get_user() already prohibits short frame which  \nhas the length less than Ethernet header size from being transmitted for  \nIFF_TAP.  \n  \nThis is to drop any frame shorter than the Ethernet header size just like  \nhow tun_get_user() does.  \n  \nCVE: CVE-2024-41091 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T09:36:06.000000Z"}]}