We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails When scpi probe fails, at any point, we need to ensure that the scpi_info is not set and will remain NULL until the probe succeeds. If it is not taken care, then it could result use-after-free as the value is exported via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc() but freed when the probe fails.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/5aa558232edc30468d1f35108826dd5b3ffe978f
git.kernel.org/...c/18048cba444a7c41dbf42c180d6b46606fc24c51
git.kernel.org/...c/08272646cd7c310642c39b7f54348fddd7987643
git.kernel.org/...c/0c29e149b6bb498778ed8a1c9597b51acfba7856
git.kernel.org/...c/87c4896d5dd7fd9927c814cf3c6289f41de3b562
git.kernel.org/...c/4f2d7b46d6b53c07f44a4f8f8f4438888f0e9e87
git.kernel.org/...c/689640efc0a2c4e07e6f88affe6d42cd40cc3f85
Support options