We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: iio: health: afe4403: Fix oob read in afe4403_read_raw KASAN report out-of-bounds read as follows: BUG: KASAN: global-out-of-bounds in afe4403_read_raw+0x42e/0x4c0 Read of size 4 at addr ffffffffc02ac638 by task cat/279 Call Trace: afe4403_read_raw iio_read_channel_info dev_attr_show The buggy address belongs to the variable: afe4403_channel_leds+0x18/0xffffffffffffe9e0 This issue can be reproduced by singe command: $ cat /sys/bus/spi/devices/spi0.0/iio\:device0/in_intensity6_raw The array size of afe4403_channel_leds is less than channels, so access with chan->address cause OOB read in afe4403_read_raw. Fix it by moving access before use it.
Reserved 2024-08-22 | Published 2024-10-21 | Updated 2024-11-04 | Assigner Linuxgit.kernel.org/...c/98afcb5f3be645d330c74c5194ba0d80e26f95e0
git.kernel.org/...c/c9268df36818ee4eaaaeadc80009b442a5ca69c9
git.kernel.org/...c/726fa3e4ab97dcff1c745bdc4fb137366cb8d3df
git.kernel.org/...c/2d6a437064ffbe685c67ddb16dfc0946074c6c3f
git.kernel.org/...c/b1756af172fb80a3edc143772d49e166ec691b6c
git.kernel.org/...c/e7e76a77aabef8989cbc0a8417af1aa040620867
git.kernel.org/...c/06c6ce21cec77dfa860d57e7a006000a57812efb
git.kernel.org/...c/58143c1ed5882c138a3cd2251a336fc8755f23d9
Support options