In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a6xx: move preemptpreparepostamble after error check
Move the call to preemptpreparepostamble() after verifying that preemptpostambleptr is valid. If preemptpostambleptr is NULL, dereferencing it in preemptpreparepostamble() would lead to a crash.
This change avoids calling the preparation function when the postamble allocation has failed, preventing potential NULL pointer dereference and ensuring proper error handling.
Patchwork: https://patchwork.freedesktop.org/patch/687659/
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71124.json",
"cna_assigner": "Linux"
}