We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() The function xdp_convert_buff_to_frame() may return NULL if it fails to correctly convert the XDP buffer into an XDP frame due to memory constraints, internal errors, or invalid data. Failing to check for NULL may lead to a NULL pointer dereference if the result is used later in processing, potentially causing crashes, data corruption, or undefined behavior. On XDP redirect failure, the associated page must be released explicitly if it was previously retained via get_page(). Failing to do so may result in a memory leak, as the pages reference count is not decremented.
Reserved 2025-04-16 | Published 2025-05-08 | Updated 2025-05-08 | Assigner Linuxgit.kernel.org/...c/5b83d30c63f9964acb1bc63eb8e670b9e0d2c240
git.kernel.org/...c/cefd8a2e2de46209ce66e6d30c237eb59b6c5bfa
git.kernel.org/...c/d6a9c4e6f9b3ec3ad98468c950ad214af8a2efb9
git.kernel.org/...c/eefccd889df3b49d92e7349d94c4aa7e1ba19f6c
git.kernel.org/...c/cc3628dcd851ddd8d418bf0c897024b4621ddc92
Support options