We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: spi: cadence: Fix out-of-bounds array access in cdns_mrvl_xspi_setup_clock() If requested_clk > 128, cdns_mrvl_xspi_setup_clock() iterates over the entire cdns_mrvl_xspi_clk_div_list array without breaking out early, causing 'i' to go beyond the array bounds. Fix that by stopping the loop when it gets to the last entry, clamping the clock to the minimum 6.25 MHz. Fixes the following warning with an UBSAN kernel: vmlinux.o: warning: objtool: cdns_mrvl_xspi_setup_clock: unexpected end of section .text.cdns_mrvl_xspi_setup_clock
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-04-16 | Assigner Linuxgit.kernel.org/...c/e50781bf7accc75883cb8a6a9921fb4e2fa8cca4
git.kernel.org/...c/c1fb84e274cb6a2bce6ba5e65116c06e0b3ab275
git.kernel.org/...c/645f1813fe0dc96381c36b834131e643b798fd73
git.kernel.org/...c/7ba0847fa1c22e7801cebfe5f7b75aee4fae317e
Support options