CVE-2022-50784
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone
If cloning the SKB fails, don't try to use it, but rather return as if we should pass it.
Coverity CID: 1503456
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In iwlwifi, a NULL-pointer dereference occurs when SKB cloning fails, fixed by adding a NULL check before use.
Vulnerability
CVE-2022-50784 describes a NULL-pointer dereference vulnerability in the Linux kernel's iwlwifi driver, specifically in the MEI (Management Entity Interface) code. When processing certain data, the driver attempts to clone an SKB (socket buffer). If the cloning operation fails (returns NULL), the driver previously would try to use the NULL pointer, leading to a potential crash or denial of service [1][2].
Exploitation
No special prerequisites or authentication are required for an attacker to trigger this condition; it can occur during normal operation of the wireless subsystem if memory allocation for the SKB clone fails. The attack surface is local, as the driver is part of the kernel, and an unprivileged user could potentially trigger this path by interacting with the wireless interface, though the primary risk is denial of service due to kernel crash.
Impact
An attacker who can cause the SKB clone to fail (e.g., by exhausting memory) may trigger a kernel NULL-pointer dereference, resulting in a system crash (denial of service). No privilege escalation or data leakage is indicated by the available sources.
Mitigation
The fix, introduced in kernel commits [1][2], adds a NULL check after the SKB clone attempt: if the clone fails, the function returns as if it should pass the original SKB instead of dereferencing the NULL pointer. All stable kernel versions that include these commits are patched. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
38b8e25073f3d0183b7c49cfdd3df49dda431Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.