Home

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fails, don't try to use it, but rather return as if we should pass it. Coverity CID: 1503456

PUBLISHED Reserved 2025-12-24 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

2da4366f9e2c44afedec4acad65a99a3c7da1a35 (git) before 8b8e25073f3dab93554ee3d5b264f7c013ebd92a
affected

2da4366f9e2c44afedec4acad65a99a3c7da1a35 (git) before 0183b7c49cfdda91284505cbcdc7feecde48cbb9
affected

2da4366f9e2c44afedec4acad65a99a3c7da1a35 (git) before d3df49dda431f7ae4132a9a0ac25a5134c04e812
affected

Default status
affected

5.17
affected

Any version before 5.17
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8b8e25073f3dab93554ee3d5b264f7c013ebd92a

git.kernel.org/...c/0183b7c49cfdda91284505cbcdc7feecde48cbb9

git.kernel.org/...c/d3df49dda431f7ae4132a9a0ac25a5134c04e812

cve.org (CVE-2022-50784)

nvd.nist.gov (CVE-2022-50784)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.