In the Linux kernel, the following vulnerability has been resolved: dma-buf: Fix NULL pointer dereference in sanitycheck() If due to a memory allocation failure mockchain() returns NULL, it is passed to dmafenceenableswsignaling() resulting in NULL pointer dereference there. Call dmafenceenableswsignaling() only if mockchain() succeeds. Found by Linux Verification Center (linuxtesting.org) with SVACE.