In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
IntheLinux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linuxkernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions,itmust be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirklist is processed.Fixthis by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinux kernel,the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it mustbeterminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list isprocessed.Fix this byadding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to thisissue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linuxkernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with thestandard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery timethe quirk list is processed.Fix this by adding the terminating empty entry.The Linux kernel CVE team has assigned CVE-2024-41028 to this issue.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,thefollowingvulnerability hasbeen resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it mustbe terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this byadding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by aempty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated bya empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.
| linux | | https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa | https://git.kernel.org/linus/3cb1f40dfdc3b9f5449076c96b4e2523139f5cd0 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:platform/x86: toshiba_acpi: Fix array out-of-bounds accessIn order to use toshiba_dmi_quirks[] together with the standard DMImatching functions, it must be terminated by a empty entry.Since this entry is missing, an array out-of-bounds access occursevery time the quirk list is processed.Fix this by adding the terminating empty entry.