We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: clk: bcm: rpi: Prevent out-of-bounds access The while loop in raspberrypi_discover_clocks() relies on the assumption that the id of the last clock element is zero. Because this data comes from the Videocore firmware and it doesn't guarantuee such a behavior this could lead to out-of-bounds access. So fix this by providing a sentinel element.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/fcae47b2d23c81603b01f56cf8db63ed64599d34
git.kernel.org/...c/ff0b144d4b0a9fbd6efe4d2c0a4b6c9bae2138d2
git.kernel.org/...c/c8b04b731d43366824841ebdca4ac715f95e0ea4
git.kernel.org/...c/bc163555603e4ae9c817675ad80d618a4cdbfa2d
Support options