In the Linux kernel, the following vulnerability has been resolved: rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() When idtab allocation fails, net is not registered with rio_add_net() yet, so kfree(net) is sufficient to release the memory. Set mport->net to NULL to avoid dangling pointer.
https://git.kernel.org/stable/c/fecf292c6691970897396190855aa38826b7104e
https://git.kernel.org/stable/c/e5a732bfe29451e16abf9c6f07ce5948b22f3d59
https://git.kernel.org/stable/c/87272e3e70ec4b666885bd520ff77463c11444ef
https://git.kernel.org/stable/c/83e579c2f7f6b1706323d744833b26470049dcc2
https://git.kernel.org/stable/c/78812c4fb7ed242d5961bf1337a49070d6487c94
https://git.kernel.org/stable/c/666183dcdd9ad3b8156a1df7f204f728f720380f
https://git.kernel.org/stable/c/649c2e853608cad0b0cba545555d168e67f094b3
https://git.kernel.org/stable/c/34a4f233df5eef5f1f113b2196142c0568b387f8