In the Linux kernel, the following vulnerability has been resolved: scsi:
qla2xxx: Fix command flush on cable pull System crash due to command failed
to flush back to SCSI layer. BUG: unable to handle kernel NULL pointer
dereference at 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU:
27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G OE --------- -
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/a27d4d0e7de305def8a5098a614053be208d1aa1 (6.9-rc2)
git.kernel.org/stable/c/09c0ac18cac206ed1218b1fe6c1a0918e5ea9211
git.kernel.org/stable/c/67b2d35853c2da25a8ca1c4190a5e96d3083c2ac
git.kernel.org/stable/c/8de1584ec4fe0ebea33c273036e7e0a05e65c81d
git.kernel.org/stable/c/8f0d32004e3a572bb77e6c11c2797c87f8c9703d
git.kernel.org/stable/c/a27d4d0e7de305def8a5098a614053be208d1aa1
git.kernel.org/stable/c/a859f6a8f4234b8ef62862bf7a92f1af5f8cd47a
git.kernel.org/stable/c/b73377124f56d2fec154737c2f8d2e839c237d5a
git.kernel.org/stable/c/d7a68eee87b05d4e29419e6f151aef99314970a9
git.kernel.org/stable/c/ec7587eef003cab15a13446d67c3adb88146a150
launchpad.net/bugs/cve/CVE-2024-26931
nvd.nist.gov/vuln/detail/CVE-2024-26931
security-tracker.debian.org/tracker/CVE-2024-26931
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
www.cve.org/CVERecord?id=CVE-2024-26931