In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpuatomexecutetablelocked() kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws remains NULL while ectx.wssize is set, leading to a potential NULL pointer dereference in atomgetsrcint() when accessing WS entries. Return -ENOMEM on allocation failure to avoid the NULL dereference.