CVE-2022-50409NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory Fixes the below NULL pointer dereference: [...] [ 14.471200] Call Trace: [ 14.471562] [ 14.471882] lock_acquire+0x245/0x2e0 [ 14.472416] ? remove_wait_queue+0x12/0x50 [ 14.473014] ? _raw_spin_lock_irqsave+0x17/0x50 [ 14.473681] _raw_spin_lock_irqsave+0x3d/0x50 [ 14.474318] ? remove_wait_queue+0x12/0x50 [ 14.474907] remove_wait_queue+0x12/0x50 [ 14.475480]

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel4.154.19.262+6
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux604326b41a6fb9b4a78b6179335decee0365cd8ca76462dbdd8bddcbeec9463bc9e54e509b860762+6
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50409: In the Linux kernel, the following vulnerability has been resolved: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory Fixes the2025-09-18
GHSA
GHSA-jv66-mppc-fxjf: In the Linux kernel, the following vulnerability has been resolved: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory Fixes th2025-09-18

📋Vendor Advisories

2
Red Hat
kernel: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory2025-09-18
Debian
CVE-2022-50409: linux - In the Linux kernel, the following vulnerability has been resolved: net: If soc...2022
CVE-2022-50409 — NULL Pointer Dereference in Linux | cvebase