CVE-2022-50773NULL Pointer Dereference in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 84.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt I got a null-ptr-defer error report when I do the following tests on the qemu platform: make defconfig and CONFIG_PARPORT=m, CONFIG_PARPORT_PC=m, CONFIG_SND_MTS64=m Then making test scripts: cat>test_mod1.sh snd_mts64_interrupt+0x24/0xa0 [snd_mts64] parport_irq_handler+0x37/0x50 [parport] __handle_irq_event_percpu+0x39/0x190 handle_irq_event_percpu+0xa/0x30 hand

Affected Packages4 packages

Linuxlinux/linux_kernel2.6.194.9.337+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux68ab801e32bbe2caac8b8c6e6e94f41fe7d687ad06ec592389f2be3199779ab823c4323dcfd2121f+9
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-cxg4-pr38-gg9p: In the Linux kernel, the following vulnerability has been resolved: ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt I got a null-ptr2025-12-24
OSV
ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt2025-12-24
OSV
CVE-2022-50773: In the Linux kernel, the following vulnerability has been resolved: ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt I got a null-ptr-d2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel ALSA mts64 module: Denial of Service via null pointer dereference2025-12-24
Debian
CVE-2022-50773: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: mts64...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50773 Impact, Exploitability, and Mitigation Steps | Wiz