We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: cpufreq: zynq: Fix refcount leak in zynq_get_revision of_find_compatible_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/f52c9be1779d70037ae300762d19b08fe3656237
git.kernel.org/...c/dcbb974254d2a27240c2e50185afdde90f923feb
git.kernel.org/...c/a530fa52d4fdffc5f010f90c05ac63019b8ff5f8
git.kernel.org/...c/22e6d8bcde8e66b64f46bf9bd2d3d0f88d40c39f
git.kernel.org/...c/179034fb108e3655142f2af0c309cef171c34d68
git.kernel.org/...c/ecefd22d5db7ccb8bec2646e5d25e058fc33162a
git.kernel.org/...c/3b01353f1825151a29d08e0868b2bf01e1116ab5
git.kernel.org/...c/d1ff2559cef0f6f8d97fba6337b28adb10689e16
Support options