We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select stuff for GPIO chip selects. GPIOs can be numbered much higher than native CS. Also, it makes no sense.
Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/4a120221661fcecb253448d7b041a52d47f1d91f
git.kernel.org/...c/ace57bd1fb49d193edec5f6a1f255f48dd5fca90
git.kernel.org/...c/254e04ec799c1ff8c1e2bd08a57c6a849895d6ff
git.kernel.org/...c/7a874e8b54ea21094f7fd2d428b164394c6cb316
Support options