In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
https://git.kernel.org/stable/c/f57ba91a46d3fc52bfdac9cca5cf5572ec7afd6d
https://git.kernel.org/stable/c/d97038d5ec2062733c1e016caf9baaf68cf64ea1
https://git.kernel.org/stable/c/a14cb307267ba7a1715403e071bdc4deda77eef5
https://git.kernel.org/stable/c/8430a8e8e85420d4cb51dcb08b0278ab194ea82f
https://git.kernel.org/stable/c/38a9d7dac3ad25323145b4aaea3b5f434f50011d
https://git.kernel.org/stable/c/2a764a2facd9dd88a69777200f65dfd0182765dc
https://git.kernel.org/stable/c/065c81ae5817b245bb9feb6d54e027702740b49a