In the Linux kernel, the following vulnerability has been resolved: firewire: nosy: ensure userlength is taken into account when fetching packet contents Ensure that packetbufferget respects the userlength provided. If the length of the head packet exceeds the userlength, packetbuffer_get will now return 0 to signify to the user that no data were read and a larger buffer size is required. Helps prevent user space overflows.