{"id":"CVE-2022-49608","summary":"pinctrl: ralink: Check for null return of devm_kcalloc","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: ralink: Check for null return of devm_kcalloc\n\nBecause of the possible failure of the allocation, data-\u003edomains might\nbe NULL pointer and will cause the dereference of the NULL pointer\nlater.\nTherefore, it might be better to check it and directly return -ENOMEM\nwithout releasing data manually if fails, because the comment of the\ndevm_kmalloc() says \"Memory allocated with this function is\nautomatically freed on driver detach.\".","modified":"2026-05-18T05:55:17.909539375Z","published":"2025-02-26T02:23:32.309Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49608.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/13596e6c9e541e90e5fc2c52b23f08b951370da9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/44016a85419ca0d4f1e4d0127b330f8e4e2a57d0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5595d30c4dc27d939635c3188c68203b6ece1711"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5694b162f275fb9a9f89422701b2b963be11e496"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6194c021496addc11763d1ffa89ce5751889fe3c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3b821e8e406d5650e587b7ac624ac24e9b780a8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49608.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49608"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a86854d0c599b3202307abceb68feee4d7061578"},{"fixed":"13596e6c9e541e90e5fc2c52b23f08b951370da9"},{"fixed":"6194c021496addc11763d1ffa89ce5751889fe3c"},{"fixed":"5694b162f275fb9a9f89422701b2b963be11e496"},{"fixed":"44016a85419ca0d4f1e4d0127b330f8e4e2a57d0"},{"fixed":"5595d30c4dc27d939635c3188c68203b6ece1711"},{"fixed":"c3b821e8e406d5650e587b7ac624ac24e9b780a8"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49608.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.18.0"},{"fixed":"4.19.254"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.208"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.134"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.58"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.18.15"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49608.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}