CVE-2022-50452

Source
https://cve.org/CVERecord?id=CVE-2022-50452
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50452.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50452
Downstream
Related
Published
2025-10-01T11:45:25.394Z
Modified
2026-04-11T11:56:54.732517Z
Summary
net: sched: cake: fix null pointer access issue when cake_init() fails
Details

In the Linux kernel, the following vulnerability has been resolved:

net: sched: cake: fix null pointer access issue when cake_init() fails

When the default qdisc is cake, if the qdisc of devqueue fails to be inited during mqprioinit(), cake_reset() is invoked to clear resources. In this case, the tins is NULL, and it will cause gpf issue.

The process is as follows: qdisccreatedflt() cakeinit() q->tins = kvcalloc(...) --->failed, q->tins is NULL ... qdiscput() ... cakereset() ... cakedequeue_one() b = &q->tins[...] --->q->tins is NULL

The following is the Call Trace information: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] RIP: 0010:cakedequeueone+0xc9/0x3c0 Call Trace: <TASK> cakereset+0xb1/0x140 qdiscreset+0xed/0x6f0 qdiscdestroy+0x82/0x4c0 qdiscput+0x9e/0xb0 qdisccreatedflt+0x2c3/0x4a0 mqprioinit+0xa71/0x1760 qdisccreate+0x3eb/0x1000 tcmodifyqdisc+0x408/0x1720 rtnetlinkrcvmsg+0x38e/0xac0 netlinkrcvskb+0x12d/0x3a0 netlinkunicast+0x4a2/0x740 netlinksendmsg+0x826/0xcc0 sock_sendmsg+0xc5/0x100 ____sys_sendmsg+0x583/0x690 ___sys_sendmsg+0xe8/0x160 _syssendmsg+0xbf/0x160 dosyscall64+0x35/0x80 entrySYSCALL64afterhwframe+0x46/0xb0 RIP: 0033:0x7f89e5122d04 </TASK>

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50452.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
046f6fd5daefac7f5abdafb436b30f63bc7c602b
Fixed
86aa1390898146f1de277bb6d2a8ed7fc7a43f12
Fixed
bc8301ea7e7f1bb9d2ba2fcdf7b5ec2f0792b47e
Fixed
ae48bee2830bf216800e1447baca39541e27a12e
Fixed
154f4c06d9dbec1a14e91286c70b6305810302e0
Fixed
1dc0a019550fd38ec6cab2d73c90df2bd659c96b
Fixed
51f9a8921ceacd7bf0d3f47fa867a64988ba1dcb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50452.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.19.0
Fixed
4.19.264
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.221
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.152
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.76
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50452.json"