We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix out-of-bound access If an ATU violation was caused by a CPU Load operation, the SPID could be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
Reserved 2024-08-21 | Published 2024-09-04 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/4a88fca95c8df3746b71e31f44a02d35f06f9864
git.kernel.org/...c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7
git.kernel.org/...c/050e7274ab2150cd212b2372595720e7b83a15bd
git.kernel.org/...c/a10d0337115a6d223a1563d853d4455f05d0b2e3
git.kernel.org/...c/18b2e833daf049223ab3c2efdf8cdee08854c484
git.kernel.org/...c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d
git.kernel.org/...c/f87ce03c652dba199aef15ac18ade3991db5477e
git.kernel.org/...c/528876d867a23b5198022baf2e388052ca67c952
Support options