CVE-2025-71291
Awaiting Analysis Awaiting Analysis - Queue
Null-pointer Dereference in Linux Kernel BCM VK Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read() In the function bcm_vk_read(), the pointer entry is checked, indicating that it can be NULL. If entry is NULL and rc is set to -EMSGSIZE, the following code may cause null-pointer dereferences: struct vk_msg_blk tmp_msg = entry->to_h_msg[0]; set_msg_id(&tmp_msg, entry->usr_msg_id); tmp_msg.size = entry->to_h_blks - 1; To prevent these possible null-pointer dereferences, copy to_h_msg, usr_msg_id, and to_h_blks from iter into temporary variables, and return these temporary variables to the application instead of accessing them through a potentially NULL entry.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's bcm_vk driver, specifically in the bcm_vk_read() function. The issue arises because the code attempts to access data through a pointer named 'entry' without properly ensuring it is not NULL. If 'entry' is NULL and a certain error code (-EMSGSIZE) is set, the code still tries to dereference 'entry', leading to possible null-pointer dereferences. This can cause the kernel to behave unexpectedly or crash. The fix involves copying necessary data from 'entry' into temporary variables before returning them, avoiding direct access through a potentially NULL pointer.


How can this vulnerability impact me? :

This vulnerability can lead to null-pointer dereferences in the Linux kernel, which may cause system instability, crashes, or denial of service. If exploited, it could disrupt normal operation of the system running the affected kernel, potentially impacting availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart