In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() set_memory_ro() can fail, leaving memory unprotected. Check its return and take it into account as an error.
https://git.kernel.org/stable/c/fdd411af8178edc6b7bf260f8fa4fba1bedd0a6d
https://git.kernel.org/stable/c/e4f602e3ff749ba770bf8ff10196e18358de6720
https://git.kernel.org/stable/c/e3540e5a7054d6daaf9a1415a48aacb092112a89
https://git.kernel.org/stable/c/a359696856ca9409fb97655c5a8ef0f549cb6e03
https://git.kernel.org/stable/c/7d2cc63eca0c993c99d18893214abf8f85d566d8
https://git.kernel.org/stable/c/05412471beba313ecded95aa17b25fe84bb2551a