In the Linux kernel, the following vulnerability has been resolved: mtd: physmap: physmap-bt1-rom: Fix unintentional stack access Cast &data to (char *) in order to avoid unintentionally accessing the stack. Notice that data is of type u32, so any increment to &data will be in the order of 4-byte chunks, and this piece of code is actually intended to be a byte offset. Addresses-Coverity-ID: 1497765 (“Out-of-bounds access”)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | < 5.10.38-1 | linux_5.10.38-1_all.deb |
Debian | 11 | all | linux | < 5.10.38-1 | linux_5.10.38-1_all.deb |
Debian | 999 | all | linux | < 5.10.38-1 | linux_5.10.38-1_all.deb |
Debian | 13 | all | linux | < 5.10.38-1 | linux_5.10.38-1_all.deb |