AI Score
Confidence
Low
EPSS
Percentile
10.9%
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: mv88e6xxx: Fix out-of-bound access
If an ATU violation was caused by a CPU Load operation, the SPID could
be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd
git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484
git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952
git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3
git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7
git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d
git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e