CVE-2022-50722
Description
In the Linux kernel, the following vulnerability has been resolved:
media: ipu3-imgu: Fix NULL pointer dereference in active selection access
What the IMGU driver did was that it first acquired the pointers to active and try V4L2 subdev state, and only then figured out which one to use.
The problem with that approach and a later patch (see Fixes: tag) is that as sd_state argument to v4l2_subdev_get_try_crop() et al is NULL, there is now an attempt to dereference that.
Fix this.
Also rewrap lines a little.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in the Linux kernel's IPU3 IMGU driver occurs when accessing active V4L2 subdev state without proper validation.
Vulnerability
Overview
The vulnerability resides in the Intel IPU3 (Image Processing Unit 3) IMGU driver within the Linux kernel. The driver incorrectly acquires pointers to both active and try V4L2 subdev states before determining which one to use. When the sd_state argument passed to functions like v4l2_subdev_get_try_crop() is NULL, the subsequent dereference leads to a NULL pointer dereference [1].
Exploitation
Context
An attacker would need to trigger a code path where the IMGU driver processes a selection request with a NULL state pointer. This could occur through crafted V4L2 ioctl calls from userspace, potentially requiring local access to the video device node. No authentication is explicitly required beyond the ability to interact with the media subsystem.
Impact
Successful exploitation results in a kernel panic or denial of service (DoS) due to the NULL pointer dereference. The crash can disrupts system stability, potentially causing a crash of the affected system. No privilege escalation or data leakage is indicated by the available information.
Mitigation
The fix is included in Linux kernel stable updates. Users should apply the latest kernel patches from their distribution or update to a kernel version containing the commit referenced in [1]. No workaround is documented.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
35265cc1202a3740717b756c1b9eb3ab6f30bVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.