We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | Linux |
Reserved | 2024-08-21 |
Published | 2024-09-04 |
Updated | 2024-09-15 |
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix out-of-bound access If an ATU violation was caused by a CPU Load operation, the SPID could be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
https://git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7
https://git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd
https://git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3
https://git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484
https://git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d
https://git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e
https://git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952