Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-36025

Опубликовано: 30 мая 2024
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() The app_reply->elem[] array is allocated earlier in this function and it has app_req.num_ports elements. Thus this > comparison needs to be >= to prevent memory corruption.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.8.9-1package
linuxfixed6.1.90-1bookwormpackage
linuxnot-affectedbullseyepackage
linuxnot-affectedbusterpackage

Примечания

  • https://git.kernel.org/linus/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd (6.9-rc4)

EPSS

Процентиль: 35%
0.0014
Низкий

Связанные уязвимости

ubuntu
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() The app_reply->elem[] array is allocated earlier in this function and it has app_req.num_ports elements. Thus this > comparison needs to be >= to prevent memory corruption.

CVSS3: 5.2
redhat
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() The app_reply->elem[] array is allocated earlier in this function and it has app_req.num_ports elements. Thus this > comparison needs to be >= to prevent memory corruption.

nvd
около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() The app_reply->elem[] array is allocated earlier in this function and it has app_req.num_ports elements. Thus this > comparison needs to be >= to prevent memory corruption.

CVSS3: 5.5
fstec
около 1 года назад

Уязвимость компонента qla2xxx ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
redos
7 месяцев назад

Множественные уязвимости kernel-lt

EPSS

Процентиль: 35%
0.0014
Низкий