5.5
MEDIUM CVSS 3.1
CVE-2022-50509
media: coda: Add check for kmalloc
Description

In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmalloc As the kmalloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.

INFO

Published Date :

Oct. 7, 2025, 4:15 p.m.

Last Modified :

Feb. 5, 2026, 3:22 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2022-50509 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
Add checks for kmalloc return values to prevent NULL pointer dereferences.
  • Check the return value of kmalloc.
  • Handle NULL pointer dereferences appropriately.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-50509 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-50509 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-50509 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-50509 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Feb. 05, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE CWE-476
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 up to (excluding) 4.14.303 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.270 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.229 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.0.16 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.1 up to (excluding) 6.1.2 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.163 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.86 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 3.19 up to (excluding) 4.9.337
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/0209e70ad496c1fcd85c2ec70e6736fd09f95d14 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/11e32126b3e56c3156fb610d793732acd2bdac4f Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/441c05485cf1a29eef05c1fd8281716815283315 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/6e5e5defdb8b0186312c2f855ace175aee6daf9b Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/7a2c66429b04e85fee44d6d9f455327bf23cf49c Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/aa17a252dbde432095e390e2092205d4debb12e1 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/ba9cc9e2035f7a45f5222543265daf7cd51f2530 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/d308c4a035b636756786af91e5f39f9d92d7d42a Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/d9b37ea8869e4e6da90c07a310d819a78cbd23d2 Types: Patch
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Oct. 07, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kmalloc As the kmalloc may return NULL pointer, it should be better to check the return value in order to avoid NULL poineter dereference, same as the others.
    Added Reference https://git.kernel.org/stable/c/0209e70ad496c1fcd85c2ec70e6736fd09f95d14
    Added Reference https://git.kernel.org/stable/c/11e32126b3e56c3156fb610d793732acd2bdac4f
    Added Reference https://git.kernel.org/stable/c/441c05485cf1a29eef05c1fd8281716815283315
    Added Reference https://git.kernel.org/stable/c/6e5e5defdb8b0186312c2f855ace175aee6daf9b
    Added Reference https://git.kernel.org/stable/c/7a2c66429b04e85fee44d6d9f455327bf23cf49c
    Added Reference https://git.kernel.org/stable/c/aa17a252dbde432095e390e2092205d4debb12e1
    Added Reference https://git.kernel.org/stable/c/ba9cc9e2035f7a45f5222543265daf7cd51f2530
    Added Reference https://git.kernel.org/stable/c/d308c4a035b636756786af91e5f39f9d92d7d42a
    Added Reference https://git.kernel.org/stable/c/d9b37ea8869e4e6da90c07a310d819a78cbd23d2
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact