-
CVE-2024-36946
- EPSS 0.13%
- Veröffentlicht 30.05.2024 16:15:17
- Zuletzt bearbeitet 21.11.2024 09:22:52
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: phonet: fix rtm_phonet_notify() skb allocation fill_route() stores three components in the skb: - struct rtmsg - RTA_DST (u8) - RTA_OIF (u32) Therefore, rtm_phonet_notify() should use NLMSG_ALIGN(sizeof(struct rtmsg)) + nla_total_size(1) + nla_total_size(4)
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
ec1f71c05caeba0f814df77e0f511d8b4618623a
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
Version <
dc6beac059f0331de97155a89d84058d4a9e49c7
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
Version <
f085e02f0a32f6dfcfabc6535c9c4a1707cef86b
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
Version <
4ff334cade9dae50e4be387f71e94fae634aa9b4
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
Version <
728a83160f98ee6b60df0d890141b9b7240182fe
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
Version <
ee9e39a6cb3ca2a3d35b4ae25547ee3526a44d00
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
Version <
9a77226440008cf04ba68faf641a2d50f4998137
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
Version <
d8cac8568618dcb8a51af3db1103e8d4cc4aeea7
Version
f062f41d06575744b9eaf725eef8a5d3b5f5b7ca
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.33
Status
affected
Version <
2.6.33
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.314
Status
unaffected
Version <=
5.4.*
Version
5.4.276
Status
unaffected
Version <=
5.10.*
Version
5.10.217
Status
unaffected
Version <=
5.15.*
Version
5.15.159
Status
unaffected
Version <=
6.1.*
Version
6.1.91
Status
unaffected
Version <=
6.6.*
Version
6.6.31
Status
unaffected
Version <=
6.8.*
Version
6.8.10
Status
unaffected
Version <=
*
Version
6.9
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.13% | 0.34 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|