CVE-2026-43148
Awaiting Analysis Awaiting Analysis - Queue
Memory Allocation Failure in Linux Kernel PowerPC SMP

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: powerpc/smp: Add check for kcalloc() failure in parse_thread_groups() As kcalloc() may fail, check its return value to avoid a NULL pointer dereference when passing it to of_property_read_u32_array().
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's powerpc/smp code where the function kcalloc() may fail but its return value was not checked. This can lead to a NULL pointer dereference when the result is passed to the function of_property_read_u32_array(). The issue was fixed by adding a check for kcalloc() failure in parse_thread_groups().


How can this vulnerability impact me? :

If the kcalloc() failure is not handled, it can cause a NULL pointer dereference, which may lead to a kernel crash or system instability on affected Linux systems running on powerpc architectures.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart