In the Linux kernel, the following vulnerability has been resolved:
tipc: check for null after calling kmemdup
kmemdup can return a null pointer so need to check for it, otherwise
the null key will be dereferenced later in tipc_crypto_key_xmit as
can be seen in the trace [1].
[1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58
[
{
"cpes": [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
],
"vendor": "linux",
"product": "linux_kernel",
"versions": [
{
"status": "affected",
"version": "1da177e4c3f4",
"lessThan": "a7d91625863d",
"versionType": "custom"
},
{
"status": "affected",
"version": "1da177e4c3f4",
"lessThan": "9404c4145542",
"versionType": "custom"
},
{
"status": "affected",
"version": "1da177e4c3f4",
"lessThan": "3e6db079751a",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "5.10.82",
"versionType": "custom",
"lessThanOrEqual": "5.11"
},
{
"status": "unaffected",
"version": "5.15.5",
"versionType": "custom",
"lessThanOrEqual": "5.16"
},
{
"status": "unaffected",
"version": "5.16"
}
],
"defaultStatus": "unknown"
}
]