In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to avoid memory leaks.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7 | patch mailing list |
https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b | patch mailing list |
https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19 | patch mailing list |
https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2 | patch mailing list |
https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9 | patch mailing list |
https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13 | patch mailing list |
https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742 | patch mailing list |
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html | mailing list |