CVE-2022-50452
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's network scheduling component called 'cake'. When the cake queueing discipline (qdisc) is set as default, if initialization of the qdisc for a device queue fails during the mqprio initialization, the cake_reset() function is called to clear resources. However, in this failure case, a pointer named 'tins' is NULL, and subsequent code attempts to access this NULL pointer, causing a general protection fault (crash) due to null pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or experience a general protection fault when the cake qdisc initialization fails, leading to potential denial of service (DoS) conditions on affected systems. This could disrupt network traffic management and degrade system stability.