In the Linux kernel, the following vulnerability has been resolved:
spi: spi-imx: Add check for spiimxsetupxfer()
Add check for the return value of spiimxsetupxfer(). spiimx->rx and spiimx->tx function pointer can be NULL when spiimxsetupxfer() return error, and make NULL pointer dereference.
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: 0x0 spiimxpiotransfer+0x50/0xd8 spiimxtransferone+0x18c/0x858 spitransferonemessage+0x43c/0x790 _spipumptransfermessage+0x238/0x5d4 _spisync+0x2b0/0x454 spiwritethenread+0x11c/0x200