Description
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler Commit 31a7a0bbeb00 ("dpaa2-switch: add bounds check for if_id in IRQ handler") introduces a range check for if_id to avoid an out-of-bounds access. If an out-of-bounds if_id is detected, the interrupt status is not cleared. This may result in an interrupt storm. Clear the interrupt status after detecting an out-of-bounds if_id to avoid the problem. Found by an experimental AI code review agent at Google.
Product status
77611cab5bdfff7a070ae574bbfba20a1de99d1b (git) before 7def51cb9fb8b8d5342443372b8cf28d8fbd7f3d
34b56c16efd61325d80bf1d780d0e176be662f59 (git) before b5bababe7703a7322bc59b803ab1587887a2a5e4
f89e33c9c37f0001b730e23b3b05ab7b1ecface2 (git) before c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e
2447edc367800ba914acf7ddd5d250416b45fb31 (git) before fa4412cdc5178a48799bafcb8af28fd2fbf3d703
1b381a638e1851d8cfdfe08ed9cdbec5295b18c9 (git) before 00f42ace446f1e4bf84988f2281131f52cd32796
31a7a0bbeb006bac2d9c81a2874825025214b6d8 (git) before 28fd8ac1d49389cb230d712116f54e27ebec11b8
31a7a0bbeb006bac2d9c81a2874825025214b6d8 (git) before 74badb9c20b1a9c02a95c735c6d3cd6121679c93
5.15.200 (semver) before 5.15.203
6.1.163 (semver) before 6.1.167
6.6.124 (semver) before 6.6.130
6.12.70 (semver) before 6.12.77
6.18.10 (semver) before 6.18.17
6.19
Any version before 6.19
5.15.203 (semver)
6.1.167 (semver)
6.6.130 (semver)
6.12.77 (semver)
6.18.17 (semver)
6.19.7 (semver)
7.0 (original_commit_for_fix)
References
git.kernel.org/...c/7def51cb9fb8b8d5342443372b8cf28d8fbd7f3d
git.kernel.org/...c/b5bababe7703a7322bc59b803ab1587887a2a5e4
git.kernel.org/...c/c7becfe3e604d138bd53b8ac3111b2b3e8ec6b0e
git.kernel.org/...c/fa4412cdc5178a48799bafcb8af28fd2fbf3d703
git.kernel.org/...c/00f42ace446f1e4bf84988f2281131f52cd32796
git.kernel.org/...c/28fd8ac1d49389cb230d712116f54e27ebec11b8
git.kernel.org/...c/74badb9c20b1a9c02a95c735c6d3cd6121679c93