In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix out-of-bound access If an ATU violation was caused by a CPU Load operation, the SPID could be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
https://git.kernel.org/stable/c/f87ce03c652dba199aef15ac18ade3991db5477e
https://git.kernel.org/stable/c/f7d8c2fabd39250cf2333fbf8eef67e837f90a5d
https://git.kernel.org/stable/c/d39f5be62f098fe367d672b4dd4bc4b2b80e08e7
https://git.kernel.org/stable/c/a10d0337115a6d223a1563d853d4455f05d0b2e3
https://git.kernel.org/stable/c/528876d867a23b5198022baf2e388052ca67c952
https://git.kernel.org/stable/c/4a88fca95c8df3746b71e31f44a02d35f06f9864
https://git.kernel.org/stable/c/18b2e833daf049223ab3c2efdf8cdee08854c484
https://git.kernel.org/stable/c/050e7274ab2150cd212b2372595720e7b83a15bd