In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
In the Linux kernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.
IntheLinuxkernel, the following vulnerability has been resolved:lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()If we need to increase the tree depth, allocate a new node, and thenrace with another thread that increased the tree depth before us, we llstill have a preallocated node that might be used later.If we then use that node for a new non-root node, it ll still have apointer to the old root instead of being zeroed - fix this by zeroing itin the cmpxchg failure path.