CVE-2021-47631
ARM: davinci: da850-evm: Avoid NULL pointer dereference
Summary
Descriptions
In the Linux kernel, the following vulnerability has been resolved: ARM: davinci: da850-evm: Avoid NULL pointer dereference With newer versions of GCC, there is a panic in da850_evm_config_emac()
when booting multi_v5_defconfig in QEMU under the palmetto-bmc machine: Unable to handle kernel NULL pointer dereference at virtual address 00000020
pgd = (ptrval)
[00000020] *pgd=00000000
Internal error: Oops: 5 [#1] PREEMPT ARM
Modules linked in:
CPU: 0 PID: 1 Comm: swapper Not tainted 5.15.0 #1
Hardware name: Generic DT based system
PC is at da850_evm_config_emac+0x1c/0x120
LR is at do_one_initcall+0x50/0x1e0 The emac_pdata pointer in soc_info is NULL because davinci_soc_info only
gets populated on davinci machines but da850_evm_config_emac() is called
on all machines via device_initcall(). Move the rmii_en assignment below the machine check so that it is only
dereferenced when running on a supported SoC.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-02-26 CVE Reserved
- 2025-02-26 CVE Published
- 2025-02-26 CVE Updated
- ---------- EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
Threat Intelligence Resources (0)
Select | Title | Date |
---|
Select an advisory to view details here.
Select | Title | Date |
---|
Select an exploit to view details here.
References (9)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/bae105879f2f2404155da6f50b3636193d228a62 | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 4.9.311 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 4.9.311" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 4.14.276 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 4.14.276" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 4.19.239 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 4.19.239" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 5.4.190 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 5.4.190" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 5.10.112 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 5.10.112" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 5.15.35 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 5.15.35" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 5.17.4 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 5.17.4" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.33 < 5.18 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.33 < 5.18" | en |
Affected
|