In the Linux kernel, the following vulnerability has been resolved:
soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc
The allocation funciton devm_kcalloc may fail and return a null pointer,
which would cause a null-pointer dereference later.
It might be better to check it and directly return -ENOMEM just like the
usage of devm_kcalloc in previous code.
Metrics
Affected Vendors & Products
References
History
Mon, 17 Mar 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | CWE-476 | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
Thu, 27 Feb 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc The allocation funciton devm_kcalloc may fail and return a null pointer, which would cause a null-pointer dereference later. It might be better to check it and directly return -ENOMEM just like the usage of devm_kcalloc in previous code. | |
Title | soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T02:13:02.751Z
Updated: 2025-03-26T17:45:12.086Z
Reserved: 2025-02-26T02:08:31.573Z
Link: CVE-2022-49453

No data.

Status : Analyzed
Published: 2025-02-26T07:01:21.673
Modified: 2025-03-17T16:11:54.510
Link: CVE-2022-49453
