We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix a window for use-after-free During a destroy CQ an interrupt may cause processing of a CQE after CQ resources are freed by irdma_cq_free_rsrc(). Fix this by moving the call to irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is called under the cq_lock.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/92520864ef9f912f38b403d172a0ded020683d55
git.kernel.org/...c/0abf2eef80295923b819ce89ff9edc1fe61be17c
git.kernel.org/...c/350ac793a03c8a30a3f2b27fc282cd1c67070763
git.kernel.org/...c/8ecef7890b3aea78c8bbb501a4b5b8134367b821
Support options