We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: iio: backend: make sure to NULL terminate stack buffer Make sure to NULL terminate the buffer in iio_backend_debugfs_write_reg() before passing it to sscanf(). It is a stack variable so we should not assume it will 0 initialized.
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/df3892e5e861c43d5612728ed259634675b8a71f
git.kernel.org/...c/04271a4d2740f98bbe36f82cd3d74677a839d1eb
git.kernel.org/...c/fd791c81f410ab1c554686a6f486dc7a176dfe35
git.kernel.org/...c/035b4989211dc1c8626e186d655ae8ca5141bb73
Support options