In the Linux kernel, the following vulnerability has been resolved: eth: bnxt: fix out-of-range access of vnic_info array The bnxt_queue_{start | stop}() access vnic_info as much as allocated, which indicates bp->nr_vnics. So, it should not reach bp->vnic_info[bp->nr_vnics].
https://git.kernel.org/stable/c/b1e081d331ab3a0dea25425f2b6ddeb365fc9d22
https://git.kernel.org/stable/c/919f9f497dbcee75d487400e8f9815b74a6a37df