In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | <= 5.10.* |
| Linux | Linux | 8.0 |
| Linux | Linux | < 9.3.4 |
| Linux | Linux | 3.1.0 |