In the Linux kernel, the following vulnerability has been resolved:
soc: bcm: Check for NULL return of devm_kzalloc()
As the potential failure of allocation, devm_kzalloc() may return NULL. Then the 'pd->pmb' and the follow lines of code may bring null pointer dereference.
Therefore, it is better to check the return value of devm_kzalloc() to avoid this confusion.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49448.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49448.json"
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5650e103bfc70156001615861fb8aafb3947da6e",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49448-018d770f",
"digest": {
"length": 1472.0,
"function_hash": "181710452490843157441276397369457358061"
},
"signature_type": "Function",
"target": {
"file": "drivers/soc/bcm/bcm63xx/bcm-pmb.c",
"function": "bcm_pmb_probe"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b48b98743b568bb219152ba2e15af6ef0d3d8a9b",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49448-44d979f0",
"digest": {
"length": 1399.0,
"function_hash": "315822537228627185180874829731595992368"
},
"signature_type": "Function",
"target": {
"file": "drivers/soc/bcm/bcm63xx/bcm-pmb.c",
"function": "bcm_pmb_probe"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5650e103bfc70156001615861fb8aafb3947da6e",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49448-5e751c4e",
"digest": {
"threshold": 0.9,
"line_hashes": [
"262097555959005181058079913574850597000",
"27185054072158377429869931601101635927",
"107714781890762749779889001978625453330"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/soc/bcm/bcm63xx/bcm-pmb.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36339ea7bae4943be01c8e9545e46e334591fecd",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49448-a2462269",
"digest": {
"length": 1399.0,
"function_hash": "315822537228627185180874829731595992368"
},
"signature_type": "Function",
"target": {
"file": "drivers/soc/bcm/bcm63xx/bcm-pmb.c",
"function": "bcm_pmb_probe"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36339ea7bae4943be01c8e9545e46e334591fecd",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49448-ae99e039",
"digest": {
"threshold": 0.9,
"line_hashes": [
"262097555959005181058079913574850597000",
"27185054072158377429869931601101635927",
"107714781890762749779889001978625453330"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/soc/bcm/bcm63xx/bcm-pmb.c"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b48b98743b568bb219152ba2e15af6ef0d3d8a9b",
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2022-49448-c1ad21b9",
"digest": {
"threshold": 0.9,
"line_hashes": [
"262097555959005181058079913574850597000",
"27185054072158377429869931601101635927",
"107714781890762749779889001978625453330"
]
},
"signature_type": "Line",
"target": {
"file": "drivers/soc/bcm/bcm63xx/bcm-pmb.c"
}
}
]