We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: eth: fbnic: avoid double free when failing to DMA-map FW msg The semantics are that caller of fbnic_mbx_map_msg() retains the ownership of the message on error. All existing callers dutifully free the page.
Reserved 2025-04-16 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Linuxgit.kernel.org/...c/670179265ad787b9dd8e701601914618b8927755
git.kernel.org/...c/0a211e23852019ef55c70094524e87a944accbb5
git.kernel.org/...c/5bd1bafd4474ee26f504b41aba11f3e2a1175b88
Support options