In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv: Add a null pointer check to scom_debug_init_one() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Add a null pointer check, and release 'ent' to avoid memory leaks.
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7
https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2
https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9
https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13
https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742
https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19
https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b