CVE-2022-49417

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49417
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49417.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49417
Downstream
Published
2025-02-26T02:12:42.872Z
Modified
2025-12-04T14:39:45.015412Z
Summary
iwlwifi: mei: fix potential NULL-ptr deref
Details

In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: mei: fix potential NULL-ptr deref

If SKB allocation fails, continue rather than using the NULL pointer.

Coverity CID: 1497650

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49417.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2da4366f9e2c44afedec4acad65a99a3c7da1a35
Fixed
29b81de94d62b5e2704bb5106b3e701ca8d7c7a4
Fixed
5d8d06fd3a02919100b28f927bcb76481ec0a0e3
Fixed
78488a64aea94a3336ee97f345c1496e9bc5ebdf

Affected versions

v5.*

v5.16
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.17.1
v5.17.10
v5.17.11
v5.17.12
v5.17.13
v5.17.2
v5.17.3
v5.17.4
v5.17.5
v5.17.6
v5.17.7
v5.17.8
v5.17.9
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.18.1
v5.18.2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.14
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.3