CVE-2021-47651

In the Linux kernel, the following vulnerability has been resolved: soc: qcom: rpmpd: Check for null return of devm_kcalloc Because of the possible failure of the allocation, data->domains might be NULL pointer and will cause the dereference of the NULL pointer later. Therefore, it might be better to check it and directly return -ENOMEM without releasing data manually if fails, because the comment of the devm_kmalloc() says "Memory allocated with this function is automatically freed on driver detach.".
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Mar 2025, 19:10

Type Values Removed Values Added
CWE CWE-476
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: rpmpd: Verificar el retorno nulo de devm_kcalloc Debido al posible fallo de la asignación, data->domains podría ser un puntero NULL y provocará la desreferencia del puntero NULL más adelante. Por lo tanto, podría ser mejor verificarlo y devolver directamente -ENOMEM sin liberar los datos manualmente si falla, porque el comentario de devm_kmalloc() dice "La memoria asignada con esta función se libera automáticamente al desconectar el controlador".
References () https://git.kernel.org/stable/c/31b5124d742969ea8bf7a1360596f548ca23e770 - () https://git.kernel.org/stable/c/31b5124d742969ea8bf7a1360596f548ca23e770 - Patch
References () https://git.kernel.org/stable/c/5a811126d38f9767a20cc271b34db7c8efc5a46c - () https://git.kernel.org/stable/c/5a811126d38f9767a20cc271b34db7c8efc5a46c - Patch
References () https://git.kernel.org/stable/c/724376c30af5a57686b223dbcd6188e07d2a1de2 - () https://git.kernel.org/stable/c/724376c30af5a57686b223dbcd6188e07d2a1de2 - Patch
References () https://git.kernel.org/stable/c/755dbc3d73789ac9f0017c729abf5e4b153bf799 - () https://git.kernel.org/stable/c/755dbc3d73789ac9f0017c729abf5e4b153bf799 - Patch
References () https://git.kernel.org/stable/c/84b89fa877ad576e9ee8130f412cfd592f274508 - () https://git.kernel.org/stable/c/84b89fa877ad576e9ee8130f412cfd592f274508 - Patch
References () https://git.kernel.org/stable/c/b5d6eba71997b6d661935d2b15094ac7f9f6132d - () https://git.kernel.org/stable/c/b5d6eba71997b6d661935d2b15094ac7f9f6132d - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

26 Feb 2025, 06:37

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 06:37

Updated : 2025-03-18 19:10


NVD link : CVE-2021-47651

Mitre link : CVE-2021-47651

CVE.ORG link : CVE-2021-47651


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference