We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_cep_put(new_cep) being called, new_cep will be freed, and the following dereference will cause a UAF problem. Fix this issue.
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/bc1db4d8f1b0dc480d7d745a60a8cc94ce2badd4
git.kernel.org/...c/667a628ab67d359166799fad89b3c6909599558a
git.kernel.org/...c/a114d25d584c14019d31dbf2163780c47415a187
git.kernel.org/...c/78411a133312ce7d8a3239c76a8fd85bca1cc10f
git.kernel.org/...c/7aa6bb5276d9fec98deb05615a086eeb893854ad
git.kernel.org/...c/83437689249e6a17b25e27712fbee292e42e7855
Support options