We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: char: xillybus: Don't destroy workqueue from work item running on it Triggered by a kref decrement, destroy_workqueue() may be called from within a work item for destroying its own workqueue. This illegal situation is averted by adding a module-global workqueue for exclusive use of the offending work item. Other work items continue to be queued on per-device workqueues to ensure performance.
Reserved 2024-08-21 | Published 2024-09-04 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/409b495f8e3300d5fba08bc817fa8825dae48cc9
git.kernel.org/...c/5d3567caff2a1d678aa40cc74a54e1318941fad3
git.kernel.org/...c/a7ad105b12256ec7fb6d6d1a0e2e60f00b7da157
git.kernel.org/...c/aa1a19724fa2c31e97a9be48baedd4692b265157
git.kernel.org/...c/ccbde4b128ef9c73d14d0d7817d68ef795f6d131
Support options