We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: Flush the notify_hotplug_work When performing continuous unbind/bind operations on the USB drivers available on the Renesas RZ/G2L SoC, a kernel crash with the message "Unable to handle kernel NULL pointer dereference at virtual address" may occur. This issue points to the usbhsc_notify_hotplug() function. Flush the delayed work to avoid its execution when driver resources are unavailable.
Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/4cd847a7b630a85493d0294ad9542c21aafaa246
git.kernel.org/...c/394965f90454d6f00fe11879142b720c6c1a872e
git.kernel.org/...c/3248c1f833f924246cb98ce7da4569133c1b2292
git.kernel.org/...c/4ca078084cdd5f32d533311d6a0b63a60dcadd41
git.kernel.org/...c/d50f5c0cd949593eb9a3d822b34d7b50046a06b7
git.kernel.org/...c/e5aac1c9b2974636db7ce796ffa6de88fa08335e
git.kernel.org/...c/830818c8e70c0364e377f0c243b28061ef7967eb
git.kernel.org/...c/552ca6b87e3778f3dd5b87842f95138162e16c82
Support options