We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: scsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus() If device_register() fails in tcm_loop_setup_hba_bus(), the name allocated by dev_set_name() need be freed. As comment of device_register() says, it should use put_device() to give up the reference in the error path. So fix this by calling put_device(), then the name can be freed in kobject_cleanup(). The 'tl_hba' will be freed in tcm_loop_release_adapter(), so it don't need goto error label in this case.
Reserved 2025-04-16 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/41a6b8b527a5957fab41c3c05e25ad125268e2e9
git.kernel.org/...c/28f7ff5e7559d226e63c7c5de74eb075a83d8c53
git.kernel.org/...c/75205f1b47a88c3fac4f30bd7567e89b2887c7fd
git.kernel.org/...c/a636772988bafab89278e7bb3420d8e8eacfe912
git.kernel.org/...c/dce0589a3faec9e2e543e97bca7e62592ec85585
git.kernel.org/...c/bc68e428d4963af0201e92159629ab96948f0893
Support options