lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025022649-CVE-2021-47651-57dd@gregkh>
Date: Wed, 26 Feb 2025 02:54:02 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2021-47651: soc: qcom: rpmpd: Check for null return of devm_kcalloc

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: rpmpd: Check for null return of devm_kcalloc

Because of the possible failure of the allocation, data->domains might
be NULL pointer and will cause the dereference of the NULL pointer
later.
Therefore, it might be better to check it and directly return -ENOMEM
without releasing data manually if fails, because the comment of the
devm_kmalloc() says "Memory allocated with this function is
automatically freed on driver detach.".

The Linux kernel CVE team has assigned CVE-2021-47651 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 5.1 with commit bbe3a66c3f5a65fb3d702351bac2a6033944d389 and fixed in 5.4.189 with commit 755dbc3d73789ac9f0017c729abf5e4b153bf799
	Issue introduced in 5.1 with commit bbe3a66c3f5a65fb3d702351bac2a6033944d389 and fixed in 5.10.110 with commit b5d6eba71997b6d661935d2b15094ac7f9f6132d
	Issue introduced in 5.1 with commit bbe3a66c3f5a65fb3d702351bac2a6033944d389 and fixed in 5.15.33 with commit 724376c30af5a57686b223dbcd6188e07d2a1de2
	Issue introduced in 5.1 with commit bbe3a66c3f5a65fb3d702351bac2a6033944d389 and fixed in 5.16.19 with commit 84b89fa877ad576e9ee8130f412cfd592f274508
	Issue introduced in 5.1 with commit bbe3a66c3f5a65fb3d702351bac2a6033944d389 and fixed in 5.17.2 with commit 31b5124d742969ea8bf7a1360596f548ca23e770
	Issue introduced in 5.1 with commit bbe3a66c3f5a65fb3d702351bac2a6033944d389 and fixed in 5.18 with commit 5a811126d38f9767a20cc271b34db7c8efc5a46c

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2021-47651
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/soc/qcom/rpmpd.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/755dbc3d73789ac9f0017c729abf5e4b153bf799
	https://git.kernel.org/stable/c/b5d6eba71997b6d661935d2b15094ac7f9f6132d
	https://git.kernel.org/stable/c/724376c30af5a57686b223dbcd6188e07d2a1de2
	https://git.kernel.org/stable/c/84b89fa877ad576e9ee8130f412cfd592f274508
	https://git.kernel.org/stable/c/31b5124d742969ea8bf7a1360596f548ca23e770
	https://git.kernel.org/stable/c/5a811126d38f9767a20cc271b34db7c8efc5a46c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ