CVE-2024-36946 Affecting kernel-syms package, versions <6.4.0-150600.23.17.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES156-KERNELSYMS-7648880
- published 8 Aug 2024
- disclosed 7 Aug 2024
Introduced: 7 Aug 2024
CVE-2024-36946 Open this link in a new tabHow to fix?
Upgrade SLES:15.6
kernel-syms
to version 6.4.0-150600.23.17.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-syms
package and not the kernel-syms
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
phonet: fix rtm_phonet_notify() skb allocation
fill_route() stores three components in the skb:
- struct rtmsg
- RTA_DST (u8)
- RTA_OIF (u32)
Therefore, rtm_phonet_notify() should use
NLMSG_ALIGN(sizeof(struct rtmsg)) + nla_total_size(1) + nla_total_size(4)
References
- https://www.suse.com/security/cve/CVE-2024-36946.html
- https://bugzilla.suse.com/1225851
- https://git.kernel.org/stable/c/4ff334cade9dae50e4be387f71e94fae634aa9b4
- https://git.kernel.org/stable/c/728a83160f98ee6b60df0d890141b9b7240182fe
- https://git.kernel.org/stable/c/9a77226440008cf04ba68faf641a2d50f4998137
- https://git.kernel.org/stable/c/d8cac8568618dcb8a51af3db1103e8d4cc4aeea7
- https://git.kernel.org/stable/c/dc6beac059f0331de97155a89d84058d4a9e49c7
- https://git.kernel.org/stable/c/ec1f71c05caeba0f814df77e0f511d8b4618623a
- https://git.kernel.org/stable/c/ee9e39a6cb3ca2a3d35b4ae25547ee3526a44d00
- https://git.kernel.org/stable/c/f085e02f0a32f6dfcfabc6535c9c4a1707cef86b
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html