We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl It is possible to peep kernel page's data by providing larger `insize` in struct cros_ec_command[1] when invoking EC host commands. Fix it by using zeroed memory. [1]: https://elixir.bootlin.com/linux/v6.2/source/include/linux/platform_data/cros_ec_proto.h#L74
Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/13493ad6a220cb3f6f3552a16b4f2753a118b633
git.kernel.org/...c/f86ff88a1548ccf5a13960c0e7625ca787ea0993
git.kernel.org/...c/ebea2e16504f40d2c2bac42ad5c5a3de5ce034b4
git.kernel.org/...c/eab28bfafcd1245a3510df9aa9eb940589956ea6
git.kernel.org/...c/a0d8644784f73fa39f57f72f374eefaba2bf48a0
git.kernel.org/...c/b20cf3f89c56b5f6a38b7f76a8128bf9f291bbd3
Support options