{"id":"CVE-2021-47003","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: idxd: Fix potential null dereference on pointer status\n\nThere are calls to idxd_cmd_exec that pass a null status pointer however\na recent commit has added an assignment to *status that can end up\nwith a null pointer dereference.  The function expects a null status\npointer sometimes as there is a later assignment to *status where\nstatus is first null checked.  Fix the issue by null checking status\nbefore making the assignment.\n\nAddresses-Coverity: (\"Explicit null dereferenced\")","modified":"2026-03-15T22:42:43.924853Z","published":"2024-02-28T09:15:38.303Z","related":["SUSE-SU-2024:1465-1","SUSE-SU-2024:1489-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120"},{"type":"FIX","url":"https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9"},{"type":"FIX","url":"https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa"},{"type":"FIX","url":"https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47003.json","unresolved_ranges":[{"events":[{"introduced":"5.10.17"},{"fixed":"5.10.38"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.11.22"}]},{"events":[{"introduced":"5.12"},{"fixed":"5.12.5"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}