CVE-2022-50826Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection() Calling v4l2_subdev_get_try_crop() and v4l2_subdev_get_try_compose() with a subdev state of NULL leads to a NULL pointer dereference. This can currently happen in imgu_subdev_set_selection() when the state passed in is NULL, as this method first gets pointers to both the "try" and "active" states and only then decides which to use. The same issue has been

Affected Packages4 packages

Linuxlinux/linux_kernel5.14.05.15.87+2
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linux0d346d2a6f54f06f36b224fd27cd6eafe8c83be9fa6bbb4894b9b947063c6ff90018a954c5f9f4b3+4
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-4gwp-jwmj-8f5v: In the Linux kernel, the following vulnerability has been resolved: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection() Calling v2025-12-30
OSV
CVE-2022-50826: In the Linux kernel, the following vulnerability has been resolved: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection() Calling v4l2025-12-30
OSV
ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection()2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: ipu3-imgu: Fix NULL pointer dereference in imgu_subdev_set_selection()2025-12-30
Debian
CVE-2022-50826: linux - In the Linux kernel, the following vulnerability has been resolved: ipu3-imgu: ...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50826 Impact, Exploitability, and Mitigation Steps | Wiz