2025-03-02 03:03:52 +00:00

41 lines
1.9 KiB
JSON

{
"id": "CVE-2022-49453",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:21.673",
"lastModified": "2025-02-26T07:01:21.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc\n\nThe allocation funciton devm_kcalloc may fail and return a null pointer,\nwhich would cause a null-pointer dereference later.\nIt might be better to check it and directly return -ENOMEM just like the\nusage of devm_kcalloc in previous code."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: ti: ti_sci_pm_domains: Verificaci\u00f3n de retorno nulo de devm_kcalloc La funci\u00f3n de asignaci\u00f3n devm_kcalloc puede fallar y devolver un puntero nulo, lo que provocar\u00eda una desreferencia de puntero nulo m\u00e1s adelante. Puede ser mejor verificarlo y devolver directamente -ENOMEM tal como se hizo con devm_kcalloc en el c\u00f3digo anterior."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/01ba41a359622ab256ce4d4f8b94c67165ae3daf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/05efc4591f80582b6fe53366b70b6a35a42fd255",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7cef9274fa1b8506949d74bc45aef072b890824a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ba56291e297d28aa6eb82c5c1964fae2d7594746",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c4e188869406b47ac3350920bf165be303cb1c96",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}