In the Linux kernel, the following vulnerability has been resolved: eth: fbnic: avoid double free when failing to DMA-map FW msg The semantics are that caller of fbnic_mbx_map_msg() retains the ownership of the message on error. All existing callers dutifully free the page.
2025-07-10T09:15:28.890
2025-07-10T13:17:30.017
Awaiting Analysis
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
-
-