0.0
NA
CVE-2022-50509
media: coda: Add check for kmalloc
Description

In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmalloc As the kmalloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.

INFO

Published Date :

Oct. 7, 2025, 4:15 p.m.

Last Modified :

Oct. 8, 2025, 7:38 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50509 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
Solution
Add checks for kmalloc return values to prevent NULL pointer dereferences.
  • Check the return value of kmalloc.
  • Handle NULL pointer dereferences appropriately.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-50509 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-50509 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50509 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50509 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Oct. 07, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmalloc As the kmalloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.
    Added Reference https://git.kernel.org/stable/c/0209e70ad496c1fcd85c2ec70e6736fd09f95d14
    Added Reference https://git.kernel.org/stable/c/11e32126b3e56c3156fb610d793732acd2bdac4f
    Added Reference https://git.kernel.org/stable/c/441c05485cf1a29eef05c1fd8281716815283315
    Added Reference https://git.kernel.org/stable/c/6e5e5defdb8b0186312c2f855ace175aee6daf9b
    Added Reference https://git.kernel.org/stable/c/7a2c66429b04e85fee44d6d9f455327bf23cf49c
    Added Reference https://git.kernel.org/stable/c/aa17a252dbde432095e390e2092205d4debb12e1
    Added Reference https://git.kernel.org/stable/c/ba9cc9e2035f7a45f5222543265daf7cd51f2530
    Added Reference https://git.kernel.org/stable/c/d308c4a035b636756786af91e5f39f9d92d7d42a
    Added Reference https://git.kernel.org/stable/c/d9b37ea8869e4e6da90c07a310d819a78cbd23d2
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
No CVSS metrics available for this vulnerability.