In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: rpmpd: Check for null return of devm_kcalloc
Because of the possible failure of the allocation, data->domains might
be NULL pointer and will cause the dereference of the NULL pointer
later.
Therefore, it might be better to check it and directly return -ENOMEM
without releasing data manually if fails, because the comment of the
devm_kmalloc() says "Memory allocated with this function is
automatically freed on driver detach.".
References
Configurations
Configuration 1 (hide)
|
History
18 Mar 2025, 19:10
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
Summary |
|
|
References | () https://git.kernel.org/stable/c/31b5124d742969ea8bf7a1360596f548ca23e770 - Patch | |
References | () https://git.kernel.org/stable/c/5a811126d38f9767a20cc271b34db7c8efc5a46c - Patch | |
References | () https://git.kernel.org/stable/c/724376c30af5a57686b223dbcd6188e07d2a1de2 - Patch | |
References | () https://git.kernel.org/stable/c/755dbc3d73789ac9f0017c729abf5e4b153bf799 - Patch | |
References | () https://git.kernel.org/stable/c/84b89fa877ad576e9ee8130f412cfd592f274508 - Patch | |
References | () https://git.kernel.org/stable/c/b5d6eba71997b6d661935d2b15094ac7f9f6132d - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
26 Feb 2025, 06:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 06:37
Updated : 2025-03-18 19:10
NVD link : CVE-2021-47651
Mitre link : CVE-2021-47651
CVE.ORG link : CVE-2021-47651
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference