We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: Fix refcount leak in omapdss_init_of omapdss_find_dss_of_node() calls of_find_compatible_node() to get device node. of_find_compatible_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() in later error path and normal path.
Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/935035cf97c8cd6794044b500fb0a44a6d30ffa1
git.kernel.org/...c/14bac0c7035bf920e190a63c7e1b113c72eadbf4
git.kernel.org/...c/230ad40a59c9a9ee8f3822b9a7bec09404102ebc
git.kernel.org/...c/a32dc6829e33c54e751346aa3e08ddb6d0e1a6a0
git.kernel.org/...c/507159facf002d113c4878fec67f37d62f187887
git.kernel.org/...c/9705db1eff38d6b9114121f9e253746199b759c9
Support options