We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: efi: fix potential NULL deref in efi_mem_reserve_persistent When iterating on a linked list, a result of memremap is dereferenced without checking it for NULL. This patch adds a check that falls back on allocating a new page in case memremap doesn't succeed. Found by Linux Verification Center (linuxtesting.org) with SVACE. [ardb: return -ENOMEM instead of breaking out of the loop]
Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/d92a25627bcdf264183670da73c9a60c0bac327e
git.kernel.org/...c/87d4ff18738fd71e7e3c10827c80257da6283697
git.kernel.org/...c/d8fc0b5fb3e816a4a8684bcd3ed02cbef0fce23c
git.kernel.org/...c/a2e6a9ff89f13666a1c3ff7195612ab949ea9afc
git.kernel.org/...c/966d47e1f27c45507c5df82b2a2157e5a4fd3909
Support options