We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | Linux |
Reserved | 2024-05-17 |
Published | 2024-05-30 |
Updated | 2024-08-02 |
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() The app_reply->elem[] array is allocated earlier in this function and it has app_req.num_ports elements. Thus this > comparison needs to be >= to prevent memory corruption.
https://git.kernel.org/stable/c/8c820f7c8e9b46238d277c575392fe9930207aab
https://git.kernel.org/stable/c/9fc74e367be4247a5ac39bb8ec41eaa73fade510
https://git.kernel.org/stable/c/60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a
https://git.kernel.org/stable/c/ea8ac95c22c93acecb710209a7fd10b851afe817
https://git.kernel.org/stable/c/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd