CVE-2022-49448
soc: bcm: Check for NULL return of devm_kzalloc()
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: soc: bcm: Check for NULL return of devm_kzalloc() As the potential failure of allocation, devm_kzalloc() may return NULL. Then the 'pd->pmb' and the follow lines of code may bring null pointer dereference. Therefore, it is better to check the return value of devm_kzalloc() to avoid this confusion.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 26, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
8bcac4011ebe0dbdd46fd55b036ee855c95702d3 < 5650e103bfc70156001615861fb8aafb3947da6e 8bcac4011ebe0dbdd46fd55b036ee855c95702d3 < 36339ea7bae4943be01c8e9545e46e334591fecd 8bcac4011ebe0dbdd46fd55b036ee855c95702d3 < b48b98743b568bb219152ba2e15af6ef0d3d8a9b 8bcac4011ebe0dbdd46fd55b036ee855c95702d3 < b4bd2aafacce48db26b0a213d849818d940556dd
Linux / Linux
5.12
References
git.kernel.org: https://git.kernel.org/stable/c/5650e103bfc70156001615861fb8aafb3947da6e git.kernel.org: https://git.kernel.org/stable/c/36339ea7bae4943be01c8e9545e46e334591fecd git.kernel.org: https://git.kernel.org/stable/c/b48b98743b568bb219152ba2e15af6ef0d3d8a9b git.kernel.org: https://git.kernel.org/stable/c/b4bd2aafacce48db26b0a213d849818d940556dd