CVE-2022-50501

In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for dcoda_iram_alloc As the coda_iram_alloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Jan 2026, 19:45

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/05f165ded4a7baec31b65aba88e2cd1fb9b91db2 - () https://git.kernel.org/stable/c/05f165ded4a7baec31b65aba88e2cd1fb9b91db2 - Patch
References () https://git.kernel.org/stable/c/2b436f1410245412ea5e4c356a175a928d73eed3 - () https://git.kernel.org/stable/c/2b436f1410245412ea5e4c356a175a928d73eed3 - Patch
References () https://git.kernel.org/stable/c/2c6887d5a29024bada6928d1d0959c9990401384 - () https://git.kernel.org/stable/c/2c6887d5a29024bada6928d1d0959c9990401384 - Patch
References () https://git.kernel.org/stable/c/35ddd00b36589cf948875b825eedaab1aefd5ad5 - () https://git.kernel.org/stable/c/35ddd00b36589cf948875b825eedaab1aefd5ad5 - Patch
References () https://git.kernel.org/stable/c/45f57abaee136a1e39d2b04443a1bd5311ba7d94 - () https://git.kernel.org/stable/c/45f57abaee136a1e39d2b04443a1bd5311ba7d94 - Patch
References () https://git.kernel.org/stable/c/532417dc98cb9c1185ada4ea4e7ccf965c06bcb5 - () https://git.kernel.org/stable/c/532417dc98cb9c1185ada4ea4e7ccf965c06bcb5 - Patch
References () https://git.kernel.org/stable/c/5688d33aa293dfa122d66bef9c0258ddf7ef11e7 - () https://git.kernel.org/stable/c/5688d33aa293dfa122d66bef9c0258ddf7ef11e7 - Patch
References () https://git.kernel.org/stable/c/6b8082238fb8bb20f67e46388123e67a5bbc558d - () https://git.kernel.org/stable/c/6b8082238fb8bb20f67e46388123e67a5bbc558d - Patch
References () https://git.kernel.org/stable/c/b99872178e7473f21904fdeea38109275aad8ae8 - () https://git.kernel.org/stable/c/b99872178e7473f21904fdeea38109275aad8ae8 - Patch
First Time Linux
Linux linux Kernel
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-01-22 19:45


NVD link : CVE-2022-50501

Mitre link : CVE-2022-50501

CVE.ORG link : CVE-2022-50501


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference