Description
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix out-of-bound access If an ATU violation was caused by a CPU Load operation, the SPID could be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
Product status
27a2fa0098171199022affa76bdf15d77585457f before 4a88fca95c8df3746b71e31f44a02d35f06f9864
75c05a74e745ae7d663b04d75777af80ada2233c before d39f5be62f098fe367d672b4dd4bc4b2b80e08e7
75c05a74e745ae7d663b04d75777af80ada2233c before 050e7274ab2150cd212b2372595720e7b83a15bd
75c05a74e745ae7d663b04d75777af80ada2233c before a10d0337115a6d223a1563d853d4455f05d0b2e3
75c05a74e745ae7d663b04d75777af80ada2233c before 18b2e833daf049223ab3c2efdf8cdee08854c484
75c05a74e745ae7d663b04d75777af80ada2233c before f7d8c2fabd39250cf2333fbf8eef67e837f90a5d
75c05a74e745ae7d663b04d75777af80ada2233c before f87ce03c652dba199aef15ac18ade3991db5477e
75c05a74e745ae7d663b04d75777af80ada2233c before 528876d867a23b5198022baf2e388052ca67c952
1657d2814e83d3e338d6d60c5829d15d86645bc0
5.0
Any version before 5.0
4.19.323
5.4.283
5.10.225
5.15.166
6.1.107
6.6.48
6.10.7
6.11
References
git.kernel.org/...c/4a88fca95c8df3746b71e31f44a02d35f06f9864
git.kernel.org/...c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7
git.kernel.org/...c/050e7274ab2150cd212b2372595720e7b83a15bd
git.kernel.org/...c/a10d0337115a6d223a1563d853d4455f05d0b2e3
git.kernel.org/...c/18b2e833daf049223ab3c2efdf8cdee08854c484
git.kernel.org/...c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d
git.kernel.org/...c/f87ce03c652dba199aef15ac18ade3991db5477e
git.kernel.org/...c/528876d867a23b5198022baf2e388052ca67c952