In the Linux kernel, the following vulnerability has been resolved: powerpc/lib: Validate size for vector operations Some of the fp/vmx code in sstep.c assume a certain maximum size for the instructions being emulated. The size of those operations however is determined separately in analyse_instr(). Add a check to validate the assumption on the maximum size of the operations, so as to prevent any unintended kernel stack corruption.
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b
https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678
https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e
https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59
https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd
https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414
https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c
https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf