In the Linux kernel, the following vulnerability has been resolved: powerpc/lib: Validate size for vector operations Some of the fp/vmx code in sstep.c assume a certain maximum size for the instructions being emulated. The size of those operations however is determined separately in analyse_instr(). Add a check to validate the assumption on the maximum size of the operations, so as to prevent any unintended kernel stack corruption.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 | patch mailing list |
https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf | patch mailing list |
https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 | patch mailing list |
https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b | patch mailing list |
https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e | patch mailing list |
https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c | patch mailing list |
https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd | patch mailing list |
https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 | patch mailing list |
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html | mailing list patch |