In the Linux kernel, the following vulnerability has been resolved: spi: intel: Add check devm_kasprintf() returned value intel_spi_populate_chip() use devm_kasprintf() to set pdata->name. This can return a NULL pointer on failure but this returned value is not checked.
https://git.kernel.org/stable/c/6e68abdc5d674f9f4185bf1e1956368d05df4838
https://git.kernel.org/stable/c/2920294686ec23211637998f3ec386dfd3d784a6