We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: rapidio: add check for rio_add_net() in rio_scan_alloc_net() The return value of rio_add_net() should be checked. If it fails, put_device() should be called to free the memory and give up the reference initialized in rio_add_net().
Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/6d22953c4a183d0b7fdf34d68c5debd16da6edc5
git.kernel.org/...c/4f3509cfcc02e9d757f2714bb7dbbeec35de6fa7
git.kernel.org/...c/181d4daaefb3bceeb2f2635ba9f3781eeda9e550
git.kernel.org/...c/ad82be4298a89a9ae46f07128bdf3d8614bce745
git.kernel.org/...c/e6411c3b9512dba09af7d014d474516828c89706
git.kernel.org/...c/c332f3e2df0fcae5a45fd55cc18902fb1e4825ca
git.kernel.org/...c/a0d069ccc475abaaa79c6368ee27fc0b5912bea8
git.kernel.org/...c/e842f9a1edf306bf36fe2a4d847a0b0d458770de
Support options