Description
In the Linux kernel, the following vulnerability has been resolved: net: mvneta: Prevent out of bounds read in mvneta_config_rss() The pp->indir[0] value comes from the user. It is passed to: if (cpu_online(pp->rxq_def)) inside the mvneta_percpu_elect() function. It needs bounds checkeding to ensure that it is not beyond the end of the cpu bitmap.
References (8)
Core 8
Core References
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
2.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (9)
linux/Kernel
4.10.0 - 4.14.302linux
linux/Kernel
4.15.0 - 4.19.269linux
linux/Kernel
4.20.0 - 5.4.227linux
linux/Kernel
4.5.0 - 4.9.336linux
linux/Kernel
5.11.0 - 5.15.83linux
linux/Kernel
5.16.0 - 6.0.13linux
linux/Kernel
5.5.0 - 5.10.159linux
linux/linux_kernel
6.1 rc1 (8 CPE variants)
linux/linux_kernel
4.5 - 4.9.336
Published
Oct 21, 2024
Tracked Since
Feb 18, 2026