In the Linux kernel, the following vulnerability has been resolved:
net: dsa: mv88e6xxx: Fix out-of-bound access
If an ATU violation was caused by a CPU Load operation, the SPID could
be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/528876d867a23b5198022baf2e388052ca67c952 (6.11-rc5)
git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd
git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484
git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952
git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3
git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7
git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d
git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e
launchpad.net/bugs/cve/CVE-2024-44988
nvd.nist.gov/vuln/detail/CVE-2024-44988
security-tracker.debian.org/tracker/CVE-2024-44988
www.cve.org/CVERecord?id=CVE-2024-44988