We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: Add NULL check in udma_probe() devm_kasprintf() returns NULL when memory allocation fails. Currently, udma_probe() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue.
Reserved 2025-04-16 | Published 2025-07-03 | Updated 2025-07-03 | Assigner Linuxgit.kernel.org/...c/ec1ea394c40523835bbedd8fc4934b77b461b6fe
git.kernel.org/...c/9f133e04c62246353b8b1f0a679535c65161ebcf
git.kernel.org/...c/d61d5ba5bd5b0e39e30b34dcd92946e084bca0d0
git.kernel.org/...c/b79e10050d9d1e200541d25751dd5cb8ec58483c
git.kernel.org/...c/bc6ddff79835f71310a21645d8fcf08ec473e969
git.kernel.org/...c/643db430f4cbd91dd2b63c49d62d0abb6debc13b
git.kernel.org/...c/fd447415e74bccd7362f760d4ea727f8e1ebfe91
Support options