Description
In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: move preempt_prepare_postamble after error check Move the call to preempt_prepare_postamble() after verifying that preempt_postamble_ptr is valid. If preempt_postamble_ptr is NULL, dereferencing it in preempt_prepare_postamble() would lead to a crash. This change avoids calling the preparation function when the postamble allocation has failed, preventing potential NULL pointer dereference and ensuring proper error handling. Patchwork: https://patchwork.freedesktop.org/patch/687659/
Product status
50117cad0c50410cff0d43a1141a562b1347e7c5 (git) before 2c46497eb148ec61909f4101b8443f3c4c2daaec
50117cad0c50410cff0d43a1141a562b1347e7c5 (git) before ef3b04091fd8bc737dc45312375df8625b8318e2
6.13
Any version before 6.13
6.18.3 (semver)
6.19 (original_commit_for_fix)
References
git.kernel.org/...c/2c46497eb148ec61909f4101b8443f3c4c2daaec
git.kernel.org/...c/ef3b04091fd8bc737dc45312375df8625b8318e2