In the Linux kernel, the following vulnerability has been resolved: tipc:
fix a possible memleak in tipc_buf_append __skb_linearize() doesn’t free
the skb when it fails, so move ‘*buf = NULL’ after __skb_linearize(), so
that the skb can be freed on the err path.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/97bf6f81b29a8efaf5d0983251a7450e5794370d (6.9-rc7)
git.kernel.org/stable/c/01cd1b7b685751ee422d00d050292a3d277652d6
git.kernel.org/stable/c/2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae
git.kernel.org/stable/c/3210d34fda4caff212cb53729e6bd46de604d565
git.kernel.org/stable/c/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c
git.kernel.org/stable/c/614c5a5ae45a921595952117b2e2bd4d4bf9b574
git.kernel.org/stable/c/97bf6f81b29a8efaf5d0983251a7450e5794370d
git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccd
git.kernel.org/stable/c/d03a82f4f8144befdc10518e732e2a60b34c870e
launchpad.net/bugs/cve/CVE-2024-36954
nvd.nist.gov/vuln/detail/CVE-2024-36954
security-tracker.debian.org/tracker/CVE-2024-36954
www.cve.org/CVERecord?id=CVE-2024-36954