In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
https://git.kernel.org/stable/c/efa7f31669f04084ed5996ed467ba529f4c90467
https://git.kernel.org/stable/c/e3734a9558afac91df3c655a6f2376b9d14933b7
https://git.kernel.org/stable/c/cae0787e408c30a575760a531ccb69a6b48bbfaf
https://git.kernel.org/stable/c/b5c9ee8296a3760760c7b5d2e305f91412adc795
https://git.kernel.org/stable/c/abd740db896b3c588dced175af98b95852c1854b
https://git.kernel.org/stable/c/71ac2ffd7f80fdd350486f6645dc48456e55a59b
https://git.kernel.org/stable/c/5197498c902502127a47abda5359dd7f1d41946f
https://git.kernel.org/stable/c/174cf8853857c190a3c4f1f1d2d06cfd095fe859
https://git.kernel.org/stable/c/13928a837e0f014dac0322dd9f8a67c486e7f232