CVE-2022-50473
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
23/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cpufreq: Init completion before kobject_init_and_add()<br />
<br />
In cpufreq_policy_alloc(), it will call uninitialed completion in<br />
cpufreq_sysfs_release() when kobject_init_and_add() fails. And<br />
that will cause a crash such as the following page fault in complete:<br />
<br />
BUG: unable to handle page fault for address: fffffffffffffff8<br />
[..]<br />
RIP: 0010:complete+0x98/0x1f0<br />
[..]<br />
Call Trace:<br />
kobject_put+0x1be/0x4c0<br />
cpufreq_online.cold+0xee/0x1fd<br />
cpufreq_add_dev+0x183/0x1e0<br />
subsys_interface_register+0x3f5/0x4e0<br />
cpufreq_register_driver+0x3b7/0x670<br />
acpi_cpufreq_init+0x56c/0x1000 [acpi_cpufreq]<br />
do_one_initcall+0x13d/0x780<br />
do_init_module+0x1c3/0x630<br />
load_module+0x6e67/0x73b0<br />
__do_sys_finit_module+0x181/0x240<br />
do_syscall_64+0x35/0x80<br />
entry_SYSCALL_64_after_hwframe+0x63/0xcd
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1.6 (including) | 5.4.229 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.163 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.87 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3cdd91a9163248935720927531066b74f57aa43b
- https://git.kernel.org/stable/c/5c51054896bcce1d33d39fead2af73fec24f40b6
- https://git.kernel.org/stable/c/8fb4c98f20dfca1237de2e3dfdbe78d156784fd3
- https://git.kernel.org/stable/c/d88540acfc7a17079021d866de914112c396edb1
- https://git.kernel.org/stable/c/e379b88a8f8cffc99b318e028705ed9e3da0e1e0
- https://git.kernel.org/stable/c/e7c0c943ed675b66d4bbb16c51c6a3bb58da047e



