Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: move preempt_prepare_postamble after error check Move the call to preempt_prepare_postamble() after verifying that preempt_postamble_ptr is valid. If preempt_postamble_ptr is NULL, dereferencing it in preempt_prepare_postamble() would lead to a crash. This change avoids calling the preparation function when the postamble allocation has failed, preventing potential NULL pointer dereference and ensuring proper error handling. Patchwork: https://patchwork.freedesktop.org/patch/687659/

PUBLISHED Reserved 2026-01-13 | Published 2026-01-14 | Updated 2026-02-09 | Assigner Linux

Product status

Default status
unaffected

50117cad0c50410cff0d43a1141a562b1347e7c5 (git) before 2c46497eb148ec61909f4101b8443f3c4c2daaec
affected

50117cad0c50410cff0d43a1141a562b1347e7c5 (git) before ef3b04091fd8bc737dc45312375df8625b8318e2
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.18.3 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/2c46497eb148ec61909f4101b8443f3c4c2daaec

git.kernel.org/...c/ef3b04091fd8bc737dc45312375df8625b8318e2

cve.org (CVE-2025-71124)

nvd.nist.gov (CVE-2025-71124)

Download JSON