HomeDefault status
unaffected
e58db3bcd93b9e0bf5068a29f7e1a97c29926830 (git) before 6e68abdc5d674f9f4185bf1e1956368d05df4838
affected
e58db3bcd93b9e0bf5068a29f7e1a97c29926830 (git) before 2920294686ec23211637998f3ec386dfd3d784a6
affected
Default status
affected
6.9
affected
Any version before 6.9
unaffected
6.10.10 (semver)
unaffected
6.11 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: spi: intel: Add check devm_kasprintf() returned value intel_spi_populate_chip() use devm_kasprintf() to set pdata->name. This can return a NULL pointer on failure but this returned value is not checked.
Product status
e58db3bcd93b9e0bf5068a29f7e1a97c29926830 (git) before 6e68abdc5d674f9f4185bf1e1956368d05df4838
e58db3bcd93b9e0bf5068a29f7e1a97c29926830 (git) before 2920294686ec23211637998f3ec386dfd3d784a6
6.9
Any version before 6.9
6.10.10 (semver)
6.11 (original_commit_for_fix)
References
git.kernel.org/...c/6e68abdc5d674f9f4185bf1e1956368d05df4838
git.kernel.org/...c/2920294686ec23211637998f3ec386dfd3d784a6