In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()
Get logical socket id instead of physical id in discover_upi_topology() to avoid out-of-bound access on upi = &type->topology[nid][idx]; line that leads to NULL pointer dereference in upi_fill_topology()
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | 6.2.0 (including) | 6.6.14 (excluding) |
Linux_kernel | Linux | 6.7.0 (including) | 6.7.2 (excluding) |