In the Linux kernel, the following vulnerability has been resolved:
tipc: check for null after calling kmemdup
kmemdup can return a null pointer so need to check for it, otherwise the null key will be dereferenced later in tipccryptokey_xmit as can be seen in the trace [1].
[1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47186.json"
[
{
"events": [
{
"introduced": "5.5"
},
{
"fixed": "5.10.82"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.15.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.16-rc1"
}
]
}
]