We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: pds_core: make wait_context part of q_info Make the wait_context a full part of the q_info struct rather than a stack variable that goes away after pdsc_adminq_post() is done so that the context is still available after the wait loop has given up. There was a case where a slow development firmware caused the adminq request to time out, but then later the FW finally finished the request and sent the interrupt. The handler tried to complete_all() the completion context that had been created on the stack in pdsc_adminq_post() but no longer existed. This caused bad pointer usage, kernel crashes, and much wailing and gnashing of teeth.
Reserved 2025-04-16 | Published 2025-05-09 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/1d7c4b2b0bbfb09b55b2dc0e2355d7936bf89381
git.kernel.org/...c/66d7702b42ffdf0dce4808626088268a4e905ca6
git.kernel.org/...c/520f012fe75fb8efc9f16a57ef929a7a2115d892
git.kernel.org/...c/3f77c3dfffc7063428b100c4945ca2a7a8680380
Support options