We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: spi: tegra20-slink: fix UAF in tegra_slink_remove() After calling spi_unregister_master(), the refcount of master will be decrease to 0, and it will be freed in spi_controller_release(), the device data also will be freed, so it will lead a UAF when using 'tspi'. To fix this, get the master before unregister and put it when finish using it.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/415b4ce61308f24583912d887772dfcbf97f1d20
git.kernel.org/...c/800c7767e05d29656713e04532823a752e57e037
git.kernel.org/...c/67f77172644260482fdafc03b6025847944701e5
git.kernel.org/...c/7e9984d183bb1e99e766c5c2b950ff21f7f7b6c0
Support options