{ "id": "CVE-2022-49453", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:21.673", "lastModified": "2025-02-26T07:01:21.673", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc\n\nThe allocation funciton devm_kcalloc may fail and return a null pointer,\nwhich would cause a null-pointer dereference later.\nIt might be better to check it and directly return -ENOMEM just like the\nusage of devm_kcalloc in previous code." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: ti: ti_sci_pm_domains: Verificaci\u00f3n de retorno nulo de devm_kcalloc La funci\u00f3n de asignaci\u00f3n devm_kcalloc puede fallar y devolver un puntero nulo, lo que provocar\u00eda una desreferencia de puntero nulo m\u00e1s adelante. Puede ser mejor verificarlo y devolver directamente -ENOMEM tal como se hizo con devm_kcalloc en el c\u00f3digo anterior." } ], "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/01ba41a359622ab256ce4d4f8b94c67165ae3daf", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/05efc4591f80582b6fe53366b70b6a35a42fd255", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/7cef9274fa1b8506949d74bc45aef072b890824a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/ba56291e297d28aa6eb82c5c1964fae2d7594746", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, { "url": "https://git.kernel.org/stable/c/c4e188869406b47ac3350920bf165be303cb1c96", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] }