0.0
NA
CVE-2022-50501
media: coda: Add check for dcoda_iram_alloc
Description

In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for dcoda_iram_alloc As the coda_iram_alloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.

INFO

Published Date :

Oct. 4, 2025, 4:15 p.m.

Last Modified :

Oct. 6, 2025, 2:56 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50501 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Add checks for NULL pointer dereferences in coda_iram_alloc return values.
  • Review and apply kernel patches for coda_iram_alloc.
  • Ensure proper handling of NULL pointers.
  • Update the Linux kernel to the latest version.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-50501 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-50501 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50501 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50501 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Oct. 04, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for dcoda_iram_alloc As the coda_iram_alloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.
    Added Reference https://git.kernel.org/stable/c/05f165ded4a7baec31b65aba88e2cd1fb9b91db2
    Added Reference https://git.kernel.org/stable/c/2b436f1410245412ea5e4c356a175a928d73eed3
    Added Reference https://git.kernel.org/stable/c/2c6887d5a29024bada6928d1d0959c9990401384
    Added Reference https://git.kernel.org/stable/c/35ddd00b36589cf948875b825eedaab1aefd5ad5
    Added Reference https://git.kernel.org/stable/c/45f57abaee136a1e39d2b04443a1bd5311ba7d94
    Added Reference https://git.kernel.org/stable/c/532417dc98cb9c1185ada4ea4e7ccf965c06bcb5
    Added Reference https://git.kernel.org/stable/c/5688d33aa293dfa122d66bef9c0258ddf7ef11e7
    Added Reference https://git.kernel.org/stable/c/6b8082238fb8bb20f67e46388123e67a5bbc558d
    Added Reference https://git.kernel.org/stable/c/b99872178e7473f21904fdeea38109275aad8ae8
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.