We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: arcnet: Add NULL check in com20020pci_probe() devm_kasprintf() returns NULL when memory allocation fails. Currently, com20020pci_probe() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue and ensure no resources are left allocated.
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/661cf5d102949898c931e81fd4e1c773afcdeafa
git.kernel.org/...c/905a34dc1ad9a53a8aaaf8a759ea5dbaaa30418d
git.kernel.org/...c/ef8b29398ea6061ac8257f3e45c9be45cc004ce2
git.kernel.org/...c/be8a0decd0b59a52a07276f9ef3b33ef820b2179
git.kernel.org/...c/ececf8eff6c25acc239fa8f0fd837c76bc770547
git.kernel.org/...c/ebebeb58d48e25525fa654f2c53a24713fe141c3
git.kernel.org/...c/a654f31b33515d39bb56c75fd8b26bef025ced7e
git.kernel.org/...c/887226163504494ea7e58033a97c2d2ab12e05d4
git.kernel.org/...c/fda8c491db2a90ff3e6fbbae58e495b4ddddeca3
Support options