In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()The intf list iterator is an invalid pointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t really need to call atomic_dec() if we haven t calledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()The intf list iterator is an invalid pointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t really need to call atomic_dec() if we haven t calledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()The intf list iterator is an invalid pointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t really need to call atomic_dec() if we haven t calledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()The intf list iterator is an invalid pointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t really need to call atomic_dec() if we haven t calledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is confidentiality, integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to6.1.145/6.6.98/6.12.38/6.15.6 (Operating System).Using CWEto declare theproblem leadsto CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary ofthe buffer.Impacted is confidentiality,integrity, and availability.Upgrading to version 6.1.146, 6.6.99, 6.12.39, 6.15.7 or 6.16-rc1 eliminates this vulnerability. Applying the patch cbc1670297f675854e982d23c8583900ff0cc67a/e2d5c005dfc96fe857676d1d8ac46b29275cb89b/9e0d33e75c1604c3fad5586ad4dfa3b2695a3950/7c1a6ddb99858e7d68961f74ae27caeeeca67b6a/fa332f5dc6fc662ad7d3200048772c96b861cf6b is able to eliminate this problem. The bugfix is ready for download at git.kernel.org. The best possible mitigation is suggested to be upgrading to the latest version.
In the Linux kernel, the following vulnerability has been resolved:ipmi:msghandler: Fixpotential memory corruption in ipmi_create_user()The intf list iteratoris an invalidpointer if the correct intf->intf_num is not found. Calling atomic_dec(&intf->nr_users) onand invalid pointer will lead to memory corruption.We don t reallyneed to call atomic_dec() if we haven tcalledatomic_add_return() so update the if (intf->in_shutdown) path as well.