We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8712: fix use after free bugs _Read/Write_MACREG callbacks are NULL so the read/write_macreg_hdl() functions don't do anything except free the "pcmd" pointer. It results in a use after free. Delete them.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/7dce6b0ee7d78667d6c831ced957a08769973063
git.kernel.org/...c/376e15487fec837301d888068a3fcc82efb6171a
git.kernel.org/...c/9fd6170c5e2d0ccd027abe26f6f5ffc528e1bb27
git.kernel.org/...c/d0aac7146e96bf39e79c65087d21dfa02ef8db38
git.kernel.org/...c/19e3f69d19801940abc2ac37c169882769ed9770
git.kernel.org/...c/dc02aaf950015850e7589696521c7fca767cea77
git.kernel.org/...c/b1727def850904e4b8ba384043775672841663a1
git.kernel.org/...c/e230a4455ac3e9b112f0367d1b8e255e141afae0
Support options