Impact
The vulnerability arises from a missing check for a failed kcalloc() call in the parse_thread_groups function on PowerPC SMP systems. When kcalloc() returns NULL, the subsequent of_property_read_u32_array() call dereferences the pointer, causing a kernel panic. This results in a complete loss of system availability for the affected node.
Affected Systems
The flaw exists in the Linux kernel code that targets PowerPC architectures with SMP support enabled. Versions of the kernel that have not incorporated the commit adding the null‑pointer check remain vulnerable; specific kernel releases are not enumerated in the advisory, indicating the issue applies to any unpatched PowerPC SMP kernel.
Risk and Exploitability
The attack requires privileged local access, typically during system boot or when a device tree is parsed. The likely attack vector is a local attacker triggering device tree parsing while having sufficient privileges. No CVSS score or EPSS value is provided, and the issue is not listed in the CISA KEV catalog, suggesting that the exploitation probability is not quantified. Successful exploitation would lead to an immediate kernel crash and denial of service.
OpenCVE Enrichment