Description: lkdtm/bugs: Check for the NULL pointer after calling kmalloc References: https://bugzilla.redhat.com/show_bug.cgi?id=2153062 Notes: bwh> Introduced in 5.7 by commit ae2e1aad3e48e495878d9f149e437a308bfdaefa bwh> "drivers/misc/lkdtm/bugs.c: add arithmetic overflow and array bounds bwh> checks". bwh> This doesn't seem to be a security issue because the *purpose* of bwh> this driver is to trigger crashes (just not in this specific place). Bugs: upstream: released (5.19-rc1) [4a9800c81d2f34afb66b4b42e0330ae8298019a2] 5.10-upstream-stable: released (5.10.122) [56ac04f35fc5dc8b5b67a1fa2f7204282aa887d5] 4.19-upstream-stable: N/A "Vulnerable code not present" sid: released (5.18.5-1) 5.10-bullseye-security: released (5.10.127-1) 4.19-buster-security: N/A "Vulnerable code not present"