We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: media: s5p-jpeg: prevent buffer overflows The current logic allows word to be less than 2. If this happens, there will be buffer overflows, as reported by smatch. Add extra checks to prevent it. While here, remove an unused word = 0 assignment.
Reserved 2024-11-19 | Published 2024-11-19 | Updated 2024-11-19 | Assigner Linuxgit.kernel.org/...c/c5f6fefcda8fac8f082b6c5bf416567f4e100c51
git.kernel.org/...c/e5117f6e7adcf9fd7546cdd0edc9abe4474bc98b
git.kernel.org/...c/f54e8e1e39dacccebcfb9a9a36f0552a0a97e2ef
git.kernel.org/...c/a930cddfd153b5d4401df0c01effa14c831ff21e
git.kernel.org/...c/c85db2d4432de4ff9d97006691ce2dcb5bda660e
git.kernel.org/...c/784bc785a453eb2f8433dd62075befdfa1b2d6fd
git.kernel.org/...c/c951a0859fdacf49a2298b5551a7e52b95ff6f51
git.kernel.org/...c/14a22762c3daeac59a5a534e124acbb4d7a79b3a
Support options