CVE-2024-44988

In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix out-of-bound access If an ATU violation was caused by a CPU Load operation, the SPID could be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/4a88fca95c8df3746b71e31f44a02d35f06f9864 -

10 Oct 2024, 16:44

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd - () https://git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd - Patch
References () https://git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484 - () https://git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484 - Patch
References () https://git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952 - () https://git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952 - Patch
References () https://git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3 - () https://git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3 - Patch
References () https://git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7 - () https://git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7 - Patch
References () https://git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d - () https://git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d - Patch
References () https://git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e - () https://git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

05 Sep 2024, 12:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: mv88e6xxx: Se corrige el acceso fuera de los límites. Si una violación de ATU fue causada por una operación de carga de CPU, el SPID podría ser mayor que DSA_MAX_PORTS (el tamaño de la matriz mv88e6xxx_chip.ports[]).

04 Sep 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-04 20:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-44988

Mitre link : CVE-2024-44988

CVE.ORG link : CVE-2024-44988


JSON object : View

Products Affected

linux

  • linux_kernel