CVE-2022-50784NULL Pointer Dereference in Linux

Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fails, don't try to use it, but rather return as if we should pass it. Coverity CID: 1503456

Affected Packages4 packages

Linuxlinux/linux_kernel5.17.06.0.16+1
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linux2da4366f9e2c44afedec4acad65a99a3c7da1a358b8e25073f3dab93554ee3d5b264f7c013ebd92a+3
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-cj76-m557-r94x: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB2025-12-30
OSV
CVE-2022-50784: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fa2025-12-30
OSV
wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: wifi: fix potential NULL-ptr deref after clone2025-12-30
Debian
CVE-2022-50784: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwi...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50784 Impact, Exploitability, and Mitigation Steps | Wiz