First published: Thu May 30 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: tipc: fix a possible memleak in tipc_buf_append __skb_linearize() doesn't free the skb when it fails, so move '*buf = NULL' after __skb_linearize(), so that the skb can be freed on the err path.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.314 | 4.19.314 |
redhat/kernel | <5.4.276 | 5.4.276 |
redhat/kernel | <5.10.217 | 5.10.217 |
redhat/kernel | <5.15.159 | 5.15.159 |
redhat/kernel | <6.1.91 | 6.1.91 |
redhat/kernel | <6.6.31 | 6.6.31 |
redhat/kernel | <6.8.10 | 6.8.10 |
redhat/kernel | <6.9 | 6.9 |
Linux Linux kernel | >=4.4.271<4.5 | |
Linux Linux kernel | >=4.9.271<4.10 | |
Linux Linux kernel | >=4.14.235<4.15 | |
Linux Linux kernel | >=4.19.193<4.19.314 | |
Linux Linux kernel | >=5.4.124<5.4.276 | |
Linux Linux kernel | >=5.10.42<5.10.217 | |
Linux Linux kernel | >=5.12.9<5.15.159 | |
Linux Linux kernel | >=5.16<6.1.91 | |
Linux Linux kernel | >=6.2<6.6.31 | |
Linux Linux kernel | >=6.7<6.8.10 | |
Linux Linux kernel | =6.9-rc1 | |
Linux Linux kernel | =6.9-rc2 | |
Linux Linux kernel | =6.9-rc3 | |
Linux Linux kernel | =6.9-rc4 | |
Linux Linux kernel | =6.9-rc5 | |
Linux Linux kernel | =6.9-rc6 | |
Debian Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.9-1 6.12.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.