We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() The wrong goto label was used for the error case and missed cleanup of the pkt allocation. Addresses-Coverity-ID: 1493352 ("Resource leak")
Reserved 2024-03-04 | Published 2024-03-04 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/1ced0a3015a95c6a6db45e37250912c4c86697ab
git.kernel.org/...c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c
git.kernel.org/...c/d53456492b5d02033c73dfa0f3b94c86337791ba
git.kernel.org/...c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa
git.kernel.org/...c/79dcbd8176152b860028b62f81a635d987365752
git.kernel.org/...c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59
git.kernel.org/...c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34
git.kernel.org/...c/bee90911e0138c76ee67458ac0d58b38a3190f65
Support options