We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: iio: light: Add check for array bounds in veml6075_read_int_time_ms The array contains only 5 elements, but the index calculated by veml6075_read_int_time_index can range from 0 to 7, which could lead to out-of-bounds access. The check prevents this issue. Coverity Issue CID 1574309: (#1 of 1): Out-of-bounds read (OVERRUN) overrun-local: Overrunning array veml6075_it_ms of 5 4-byte elements at element index 7 (byte offset 31) using index int_index (which evaluates to 7) This is hardening against potentially broken hardware. Good to have but not necessary to backport.
Reserved 2025-04-16 | Published 2025-04-18 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/7a40b52d4442178bee0cf1c36bc450ab951cef0f
git.kernel.org/...c/18a08b5632809faa671279b3cd27d5f96cc5a3f0
git.kernel.org/...c/9c40a68b7f97fa487e6c7e67fcf4f846a1f96692
git.kernel.org/...c/ee735aa33db16c1fb5ebccbaf84ad38f5583f3cc
Support options