We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak Using completion_done to determine whether the caller has gone away only works after a complete call. Furthermore it's still possible that the caller has not yet called wait_for_completion, resulting in another potential UAF. Fix this by making the caller use cancel_work_sync and then freeing the memory safely.
Reserved 2024-06-25 | Published 2024-07-10 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/0ce5964b82f212f4df6a9813f09a0b5de15bd9c8
git.kernel.org/...c/6396b33e98c096bff9c253ed49c008247963492a
git.kernel.org/...c/a718b6d2a329e069b27d9049a71be5931e71d960
git.kernel.org/...c/3fb4601e0db10d4fe25e46f3fa308d40d37366bd
git.kernel.org/...c/e7428e7e3fe94a5089dc12ffe5bc31574d2315ad
git.kernel.org/...c/c2d443aa1ae3175c13a665f3a24b8acd759ce9c3
git.kernel.org/...c/d0fd124972724cce0d48b9865ce3e273ef69e246
git.kernel.org/...c/d3b17c6d9dddc2db3670bc9be628b122416a3d26
Support options