{"id":"CVE-2021-47651","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: rpmpd: Check for null return of devm_kcalloc\n\nBecause of the possible failure of the allocation, data-\u003edomains might\nbe NULL pointer and will cause the dereference of the NULL pointer\nlater.\nTherefore, it might be better to check it and directly return -ENOMEM\nwithout releasing data manually if fails, because the comment of the\ndevm_kmalloc() says \"Memory allocated with this function is\nautomatically freed on driver detach.\".","modified":"2026-03-15T22:43:17.212276Z","published":"2025-02-26T06:37:06.880Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1194-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1263-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/5a811126d38f9767a20cc271b34db7c8efc5a46c"},{"type":"FIX","url":"https://git.kernel.org/stable/c/724376c30af5a57686b223dbcd6188e07d2a1de2"},{"type":"FIX","url":"https://git.kernel.org/stable/c/755dbc3d73789ac9f0017c729abf5e4b153bf799"},{"type":"FIX","url":"https://git.kernel.org/stable/c/84b89fa877ad576e9ee8130f412cfd592f274508"},{"type":"FIX","url":"https://git.kernel.org/stable/c/b5d6eba71997b6d661935d2b15094ac7f9f6132d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/31b5124d742969ea8bf7a1360596f548ca23e770"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.1"},{"fixed":"5.4.189"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.110"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.15.33"}]},{"events":[{"introduced":"5.16"},{"fixed":"5.16.19"}]},{"events":[{"introduced":"5.17"},{"fixed":"5.17.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47651.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}