We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.
Reserved 2024-08-22 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/0760acc2e6598ad4f7bd3662db2d907ef0838139
git.kernel.org/...c/d4dd21a79dbb862d2ebcf9ed90e646416009ff0d
git.kernel.org/...c/e7166d6821c15f3516bcac8ae3f155924da1908c
git.kernel.org/...c/f2ba66d8738584d124aff4e760ed1337f5f6dfb6
git.kernel.org/...c/f6f45e538328df9ce66aa61bafee1a5717c4b700
git.kernel.org/...c/9f74b9aa8d58c18927bb9b65dd5ba70a5fd61615
git.kernel.org/...c/34a9796bf0684bfd54e96a142560d560c21c983b
git.kernel.org/...c/db8f91d424fe0ea6db337aca8bc05908bbce1498
Support options