In the Linux kernel, the following vulnerability has been resolved:
phonet: fix rtm_phonet_notify() skb allocation
fill_route() stores three components in the skb:
- struct rtmsg
- RTA_DST (u8)
- RTA_OIF (u32)
Therefore, rtm_phonet_notify() should use
NLMSG_ALIGN(sizeof(struct rtmsg)) +
nla_total_size(1) +
nla_total_size(4)
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
22 Jan 2026, 20:03
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-401 | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/4ff334cade9dae50e4be387f71e94fae634aa9b4 - Patch | |
| References | () https://git.kernel.org/stable/c/728a83160f98ee6b60df0d890141b9b7240182fe - Patch | |
| References | () https://git.kernel.org/stable/c/9a77226440008cf04ba68faf641a2d50f4998137 - Patch | |
| References | () https://git.kernel.org/stable/c/d8cac8568618dcb8a51af3db1103e8d4cc4aeea7 - Patch | |
| References | () https://git.kernel.org/stable/c/dc6beac059f0331de97155a89d84058d4a9e49c7 - Patch | |
| References | () https://git.kernel.org/stable/c/ec1f71c05caeba0f814df77e0f511d8b4618623a - Patch | |
| References | () https://git.kernel.org/stable/c/ee9e39a6cb3ca2a3d35b4ae25547ee3526a44d00 - Patch | |
| References | () https://git.kernel.org/stable/c/f085e02f0a32f6dfcfabc6535c9c4a1707cef86b - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20241004-0002/ - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:22
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/4ff334cade9dae50e4be387f71e94fae634aa9b4 - | |
| References | () https://git.kernel.org/stable/c/728a83160f98ee6b60df0d890141b9b7240182fe - | |
| References | () https://git.kernel.org/stable/c/9a77226440008cf04ba68faf641a2d50f4998137 - | |
| References | () https://git.kernel.org/stable/c/d8cac8568618dcb8a51af3db1103e8d4cc4aeea7 - | |
| References | () https://git.kernel.org/stable/c/dc6beac059f0331de97155a89d84058d4a9e49c7 - | |
| References | () https://git.kernel.org/stable/c/ec1f71c05caeba0f814df77e0f511d8b4618623a - | |
| References | () https://git.kernel.org/stable/c/ee9e39a6cb3ca2a3d35b4ae25547ee3526a44d00 - | |
| References | () https://git.kernel.org/stable/c/f085e02f0a32f6dfcfabc6535c9c4a1707cef86b - |
05 Nov 2024, 10:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
30 May 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-30 16:15
Updated : 2026-01-22 20:03
NVD link : CVE-2024-36946
Mitre link : CVE-2024-36946
CVE.ORG link : CVE-2024-36946
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
