CVE-2022-50722Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: media: ipu3-imgu: Fix NULL pointer dereference in active selection access What the IMGU driver did was that it first acquired the pointers to active and try V4L2 subdev state, and only then figured out which one to use. The problem with that approach and a later patch (see Fixes: tag) is that as sd_state argument to v4l2_subdev_get_try_crop() et al is NULL, there is now an attempt to dereference that. Fix this. Also rewrap

Affected Packages4 packages

Linuxlinux/linux_kernel5.14.05.15.76+1
Debianlinux/linux_kernel< 6.0.6-1+2
CVEListV5linux/linux0d346d2a6f54f06f36b224fd27cd6eafe8c83be95265cc1202a31f7097691c3483a0d60d624424a5+3
debiandebian/linux< linux 6.0.6-1 (bookworm)

🔴Vulnerability Details

3
OSV
media: ipu3-imgu: Fix NULL pointer dereference in active selection access2025-12-24
OSV
CVE-2022-50722: In the Linux kernel, the following vulnerability has been resolved: media: ipu3-imgu: Fix NULL pointer dereference in active selection access What the2025-12-24
GHSA
GHSA-vpqj-28g2-5g9m: In the Linux kernel, the following vulnerability has been resolved: media: ipu3-imgu: Fix NULL pointer dereference in active selection access What t2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: media: ipu3-imgu: Fix NULL pointer dereference in active selection access2025-12-24
Debian
CVE-2022-50722: linux - In the Linux kernel, the following vulnerability has been resolved: media: ipu3...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50722 Impact, Exploitability, and Mitigation Steps | Wiz