We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: PCI: Fix reset_method_store() memory leak In reset_method_store(), a string is allocated via kstrndup() and assigned to the local "options". options is then used in with strsep() to find spaces: while ((name = strsep(&options, " ")) != NULL) { If there are no remaining spaces, then options is set to NULL by strsep(), so the subsequent kfree(options) doesn't free the memory allocated via kstrndup(). Fix by using a separate tmp_options to iterate with strsep() so options is preserved.
Reserved 2024-12-29 | Published 2024-12-29 | Updated 2025-01-20 | Assigner Linuxgit.kernel.org/...c/403efb4457c0c8f8f51e904cc57d39193780c6bd
git.kernel.org/...c/931d07ccffcc3614f20aaf602b31e89754e21c59
git.kernel.org/...c/8e098baf6bc3f3a6aefc383509aba07e202f7ee0
git.kernel.org/...c/543d0eb40e45c6a51f1bff02f417b602e54472d5
git.kernel.org/...c/fe6fae61f3b993160aef5fe2b7141a83872c144f
git.kernel.org/...c/2985b1844f3f3447f2d938eff1ef6762592065a5
Support options