In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write When the oob buffer length is not in multiple of words, the oob write function does out-of-bounds read on the oob source buffer at the last iteration. Fix that by always checking length limit on the oob buffer read and fill with 0xff when reaching the end of the buffer to the oob registers.
https://git.kernel.org/stable/c/d00b031266514a9395124704630b056a5185ec17
https://git.kernel.org/stable/c/aae45746f4aee9818296e0500e0703e9d8caa5b8
https://git.kernel.org/stable/c/648d1150a688698e37f7aaf302860180901cb30e
https://git.kernel.org/stable/c/5d53244186c9ac58cb88d76a0958ca55b83a15cd
https://git.kernel.org/stable/c/45fe4ad7f439799ee1b7b5f80bf82e8b34a98d25
https://git.kernel.org/stable/c/2bc3d6ac704ea7263175ea3da663fdbbb7f3dd8b
https://git.kernel.org/stable/c/2353b7bb61e45e7cfd21505d0c6747ac8c9496a1
https://git.kernel.org/stable/c/14b1d00520b4d6a4818364334ce472b79cfc8976