Executive Summary

Informations
Name CVE-2021-47651 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-18

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: rpmpd: Check for null return of devm_kcalloc

Because of the possible failure of the allocation, data->domains might be NULL pointer and will cause the dereference of the NULL pointer later. Therefore, it might be better to check it and directly return -ENOMEM without releasing data manually if fails, because the comment of the devm_kmalloc() says "Memory allocated with this function is automatically freed on driver detach.".

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47651

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3527

Sources (Detail)

https://git.kernel.org/stable/c/31b5124d742969ea8bf7a1360596f548ca23e770
https://git.kernel.org/stable/c/5a811126d38f9767a20cc271b34db7c8efc5a46c
https://git.kernel.org/stable/c/724376c30af5a57686b223dbcd6188e07d2a1de2
https://git.kernel.org/stable/c/755dbc3d73789ac9f0017c729abf5e4b153bf799
https://git.kernel.org/stable/c/84b89fa877ad576e9ee8130f412cfd592f274508
https://git.kernel.org/stable/c/b5d6eba71997b6d661935d2b15094ac7f9f6132d
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2025-06-26 01:53:00
  • Multiple Updates
2025-06-25 12:17:13
  • Multiple Updates
2025-06-24 01:57:28
  • Multiple Updates
2025-05-27 01:52:34
  • Multiple Updates
2025-03-29 02:58:10
  • Multiple Updates
2025-03-28 13:28:35
  • Multiple Updates
2025-03-28 02:42:58
  • Multiple Updates
2025-03-18 21:21:32
  • Multiple Updates
2025-02-26 17:20:34
  • First insertion