In the Linux kernel, the following vulnerability has been resolved: x86/xen: Add some null pointer checking to smp.c kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the allocation was successful by checking the pointer validity.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | < 6.1.85-1 | linux_6.1.85-1_all.deb |
Debian | 11 | all | linux | <= 5.10.209-2 | linux_5.10.209-2_all.deb |
Debian | 10 | all | linux | <= 4.19.249-2 | linux_4.19.249-2_all.deb |
Debian | 999 | all | linux | < 6.7.12-1 | linux_6.7.12-1_all.deb |
Debian | 13 | all | linux | <= 6.6.15-2 | linux_6.6.15-2_all.deb |