In the Linux kernel, the following vulnerability has been resolved:
dma-buf: Fix NULL pointer dereference in sanitycheck()
If due to a memory allocation failure mockchain() returns NULL, it is passed to dmafenceenablesw_signaling() resulting in NULL pointer dereference there.
Call dmafenceenableswsignaling() only if mock_chain() succeeds.
Found by Linux Verification Center (linuxtesting.org) with SVACE.