CVE-2022-50866
Description
In the Linux kernel, the following vulnerability has been resolved:
ASoC: pxa: fix null-pointer dereference in filter()
kasprintf() would return NULL pointer when kmalloc() fail to allocate. Need to check the return pointer before calling strcmp().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ASoC PXA driver, a null-pointer dereference in filter() occurs when kasprintf() failure can crash the system.
Vulnerability
In the Linux kernel's ASoC (ALSA System on Chip) subsystem for the PXA architecture, the filter() function in the PXA I2S audio support calls kasprintf() to allocate a string. If kasprintf() fails due to memory pressure (kmalloc failure), it returns a NULL pointer. The code then passes this NULL pointer to strcmp() without a check, leading to a null-pointer dereference and a kernel crash.
Exploitation
This vulnerability is triggered when the kernel runs low on memory, causing kasprintf() to fail. An attacker with local access and the ability to trigger audio device operations (e.g., via ALSA ioctls) could exploit this condition. No special privileges beyond normal user access to the audio subsystem are required.
Impact
A successful null-pointer dereference results in a kernel crash (kernel panic) or system crash, leading to a denial of service (DoS). The vulnerability does not allow an unprivileged user to crash the system, impacting availability.
Mitigation
The fix adds a NULL check after kasprintf() to check for NULL before calling strcmp(). Patches have been applied to the stable kernel branches as referenced in the commit history [1][2][3]. Users should update to a patched kernel version.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
93ec75e0ea9555b510a82740d0abd1d78317aa8baccb79de221a1409e8cf783baa509396a9fb9b3b67a5b21b92cf41952ec7bf231aaa1Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/0abd1d78317a3a2dfe00b203fbf14ee7df537e0anvd
- git.kernel.org/stable/c/21a1409e8cf73053b54f7860548e3043dfa351a9nvd
- git.kernel.org/stable/c/21b92cf41952577a95bfa430e39478cbd66e42a7nvd
- git.kernel.org/stable/c/3ec75e0ea9550b8f2e531172f2e67ba9d5227ec3nvd
- git.kernel.org/stable/c/5b510a82740d2a42a75b5661b402bcaf8ae22cd5nvd
- git.kernel.org/stable/c/83baa509396a742e0ce145b09fde1ce0a948f49anvd
- git.kernel.org/stable/c/9fb9b3b67a5b8669296d6372cd901ef86557e6f6nvd
- git.kernel.org/stable/c/a8baccb79de2f48a2083d51febf627eb50ce1898nvd
- git.kernel.org/stable/c/ec7bf231aaa1bdbcb69d23bc50c753c80fb22429nvd
News mentions
0No linked articles in our index yet.