Description
In the Linux kernel, the following vulnerability has been resolved:

misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read()

In the function bcm_vk_read(), the pointer entry is checked, indicating
that it can be NULL. If entry is NULL and rc is set to -EMSGSIZE, the
following code may cause null-pointer dereferences:

struct vk_msg_blk tmp_msg = entry->to_h_msg[0];
set_msg_id(&tmp_msg, entry->usr_msg_id);
tmp_msg.size = entry->to_h_blks - 1;

To prevent these possible null-pointer dereferences, copy to_h_msg,
usr_msg_id, and to_h_blks from iter into temporary variables, and return
these temporary variables to the application instead of accessing them
through a potentially NULL entry.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from a possible null-pointer dereference inside the bcm_vk kernel driver during the bcm_vk_read() operation. When an entry pointer is NULL and the return code is set to -EMSGSIZE, the code attempts to read fields from the null entry, causing a kernel fault. This fault results in a kernel panic and system crash, effectively denying service to all users on the host. The weakness corresponds to a classic null-pointer dereference (CWE-476).

Affected Systems

Linux kernel installations that include the bcm_vk driver. No specific kernel version range is listed, so all kernels shipping this driver before the patch are potentially affected.

Risk and Exploitability

The CVSS score is not provided, and the EPSS score is unavailable, indicating no publicly known exploitation trend at the time of analysis. The vulnerability is likely exploitable by local users who can invoke bcm_vk_read() (for example, by accessing the /dev/bcm_vk device or using an application that drives it). While local exploitation does not provide remote code execution, it can be used to disrupt availability. The absence of a KEV listing further suggests there are no known active exploits in the wild. Nonetheless, patching remains the recommended action to eliminate the crash vector.

Generated by OpenCVE AI on May 6, 2026 at 13:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel update that includes the bcm_vk_read null-pointer dereference fix.
  • Restrict access to the bcm_vk device so that only privileged users may open /dev/bcm_vk, mitigating the local exploitation surface.
  • If a kernel upgrade is not immediately possible, disable or unload the bcm_vk module to remove the vulnerable code from the kernel image.

Generated by OpenCVE AI on May 6, 2026 at 13:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 13:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read() In the function bcm_vk_read(), the pointer entry is checked, indicating that it can be NULL. If entry is NULL and rc is set to -EMSGSIZE, the following code may cause null-pointer dereferences: struct vk_msg_blk tmp_msg = entry->to_h_msg[0]; set_msg_id(&tmp_msg, entry->usr_msg_id); tmp_msg.size = entry->to_h_blks - 1; To prevent these possible null-pointer dereferences, copy to_h_msg, usr_msg_id, and to_h_blks from iter into temporary variables, and return these temporary variables to the application instead of accessing them through a potentially NULL entry.
Title misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:32:23.223Z

Reserved: 2026-05-06T11:31:45.509Z

Link: CVE-2025-71291

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:28.330

Modified: 2026-05-06T13:07:51.607

Link: CVE-2025-71291

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T14:15:05Z

Weaknesses