Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: tipc: fix a possible memleak in tipc_buf_append __skb_linearize() doesn't free the skb when it fails, so move '*buf = NULL' after __skb_linearize(), so that the skb can be freed on the err path.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.4.271, < 4.5 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/01cd1b7b685751ee422d00d050292a3d277652d6Patch
- https://git.kernel.org/stable/c/2f87fd9476cf9725d774e6dcb7d17859c6a6d1aePatch
- https://git.kernel.org/stable/c/3210d34fda4caff212cb53729e6bd46de604d565Patch
- https://git.kernel.org/stable/c/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2cPatch
- https://git.kernel.org/stable/c/614c5a5ae45a921595952117b2e2bd4d4bf9b574Patch
- https://git.kernel.org/stable/c/97bf6f81b29a8efaf5d0983251a7450e5794370dPatch
- https://git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccdPatch
- https://git.kernel.org/stable/c/d03a82f4f8144befdc10518e732e2a60b34c870ePatch
- https://git.kernel.org/stable/c/01cd1b7b685751ee422d00d050292a3d277652d6Patch
- https://git.kernel.org/stable/c/2f87fd9476cf9725d774e6dcb7d17859c6a6d1aePatch
- https://git.kernel.org/stable/c/3210d34fda4caff212cb53729e6bd46de604d565Patch
- https://git.kernel.org/stable/c/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2cPatch
- https://git.kernel.org/stable/c/614c5a5ae45a921595952117b2e2bd4d4bf9b574Patch
- https://git.kernel.org/stable/c/97bf6f81b29a8efaf5d0983251a7450e5794370dPatch
- https://git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccdPatch
FAQ
What is CVE-2024-36954?
CVE-2024-36954 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: tipc: fix a possible memleak in tipc_buf_append __skb_linearize() doesn't free the skb when it fails, so move '*buf = NULL' after ...
How severe is CVE-2024-36954?
CVE-2024-36954 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-36954?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.