| Summary | In the Linux kernel, the following vulnerability has been resolved: mm/page_alloc: clear page->private in free_pages_prepare() Several subsystems (slub, shmem, ttm, etc.) use page->private but don't This causes a use-after-free in the swap subsystem. The swap code uses KASAN: maybe wild-memory-access in range [0xdead000000000100-0xdead000000000107] Fix this by clearing page->private in free_pages_prepare(), ensuring all |
|---|---|
| Publication Date | May 8, 2026, 11:16 p.m. |
| Registration Date | May 9, 2026, 4:13 a.m. |
| Last Update | May 8, 2026, 11:16 p.m. |