We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function When a reset notify IPC message is received, the ISR schedules a work function and passes the ISHTP device to it via a global pointer ishtp_dev. If ish_probe() fails, the devm-managed device resources including ishtp_dev are freed, but the work is not cancelled, causing a use-after-free when the work function tries to access ishtp_dev. Use devm_work_autocancel() instead, so that the work is automatically cancelled if probe fails.
Reserved 2025-04-16 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/8c1d378b8c224fd50247625255f09fc01dcc5836
git.kernel.org/...c/0a594cb490ca6232671fc09e2dc1a0fc7ccbb0b5
git.kernel.org/...c/d3ce3afd9f791dd1b7daedfcf8c396b60af5dec0
git.kernel.org/...c/8ae2f2b0a28416ed2f6d8478ac8b9f7862f36785
Support options