We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi() The simple_write_to_buffer() function will succeed if even a single byte is initialized. However, we need to initialize the whole buffer to prevent information leaks. Just use memdup_user().
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/c1216e699a1ce83ea005510844bd7508d34c6cef
git.kernel.org/...c/4615458db7793fadc6d546ac3564b36819e77a22
git.kernel.org/...c/60c9983425167ec5073c628d83a6875760d18059
git.kernel.org/...c/05ceda14ef7c73104e709c414c3680d8a59f51d4
git.kernel.org/...c/074e865b37da55aa87baa16d68b96896f85f8adb
git.kernel.org/...c/789edc1af9c1a2293956e8534bfef3d18d629de9
git.kernel.org/...c/67470920cd3f3cb38699b1ad23234f96bead4d21
git.kernel.org/...c/7a4836560a6198d245d5732e26f94898b12eb760
Support options