We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix potential null dereference on pointer status There are calls to idxd_cmd_exec that pass a null status pointer however a recent commit has added an assignment to *status that can end up with a null pointer dereference. The function expects a null status pointer sometimes as there is a later assignment to *status where status is first null checked. Fix the issue by null checking status before making the assignment. Addresses-Coverity: ("Explicit null dereferenced")
Reserved 2024-02-27 | Published 2024-02-28 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/5756f757c72501ef1a16f5f63f940623044180e9
git.kernel.org/...c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97
git.kernel.org/...c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa
git.kernel.org/...c/28ac8e03c43dfc6a703aa420d18222540b801120
Support options