In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: Add NULL check in udma_probe()
devm_kasprintf() returns NULL when memory allocation fails. Currently, udma_probe() does not check for this case, which results in a NULL pointer dereference.
Add NULL check after devm_kasprintf() to prevent this issue.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 5.6 | 5.10.239 |
| linux / linux_kernel | 5.11 | 5.15.186 |
| linux / linux_kernel | 5.16 | 6.1.142 |
| linux / linux_kernel | 6.2 | 6.6.94 |
| linux / linux_kernel | 6.7 | 6.12.34 |
| linux / linux_kernel | 6.13 | 6.15.3 |
| debian / debian_linux | 11.0 | 11.0.x |