In the Linux kernel, the following vulnerability has been resolved: scsi:
mpi3mr: Avoid memcpy field-spanning write WARNING When the “storcli2 show”
command is executed for eHBA-9600, mpi3mr driver prints this WARNING
message: memcpy: detected field-spanning write (size 128) of single field
“bsg_reply_buf->reply_buf” at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 (size
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
git.kernel.org/linus/429846b4b6ce9853e0d803a2357bb2e55083adf0 (6.9-rc2)
git.kernel.org/stable/c/429846b4b6ce9853e0d803a2357bb2e55083adf0
git.kernel.org/stable/c/4d2772324f43cf5674ac3dbe3f74a7e656396716
git.kernel.org/stable/c/5f0266044dc611563539705bff0b3e1545fbb6aa
git.kernel.org/stable/c/f09318244c6cafd10aca741b9c01e0a2c362d43a
launchpad.net/bugs/cve/CVE-2024-36920
nvd.nist.gov/vuln/detail/CVE-2024-36920
security-tracker.debian.org/tracker/CVE-2024-36920
www.cve.org/CVERecord?id=CVE-2024-36920