In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Add NULL check in uclogic_input_configured() devm_kasprintf() returns NULL when memory allocation fails. Currently, uclogic_input_configured() does not check for this case, which results in a NULL pointer dereference. Add NULL check after devm_kasprintf() to prevent this issue.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.1 | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Hyperlink | Source | Resource |
|---|---|---|
| https://git.kernel.org/stable/c/00d52b2fa6083dd0f5c44f3604cd1bad1f9177dc | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | N/A |
| https://git.kernel.org/stable/c/01b76cc8ca243fc3376b035aa326bbc4f03d384b | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/94e7272b636a0677082e0604609e4c471e0a2caf | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/a9f58479a1a2c6f72907679c4df2f4ed92b05b39 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | N/A |
| https://git.kernel.org/stable/c/ad6caaf29bc26a48b1241ce82561fcbcf0a75aa9 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/b616453d719ee1b8bf2ea6f6cc6c6258a572a590 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://git.kernel.org/stable/c/bd07f751208ba190f9b0db5e5b7f35d5bb4a8a1e | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Patch |
| https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |