{"id":"CVE-2022-50473","summary":"cpufreq: Init completion before kobject_init_and_add()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: Init completion before kobject_init_and_add()\n\nIn cpufreq_policy_alloc(), it will call uninitialed completion in\ncpufreq_sysfs_release() when kobject_init_and_add() fails. And\nthat will cause a crash such as the following page fault in complete:\n\nBUG: unable to handle page fault for address: fffffffffffffff8\n[..]\nRIP: 0010:complete+0x98/0x1f0\n[..]\nCall Trace:\n kobject_put+0x1be/0x4c0\n cpufreq_online.cold+0xee/0x1fd\n cpufreq_add_dev+0x183/0x1e0\n subsys_interface_register+0x3f5/0x4e0\n cpufreq_register_driver+0x3b7/0x670\n acpi_cpufreq_init+0x56c/0x1000 [acpi_cpufreq]\n do_one_initcall+0x13d/0x780\n do_init_module+0x1c3/0x630\n load_module+0x6e67/0x73b0\n __do_sys_finit_module+0x181/0x240\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd","modified":"2026-03-20T12:22:35.010243Z","published":"2025-10-04T15:16:34.859Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50473.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3cdd91a9163248935720927531066b74f57aa43b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c51054896bcce1d33d39fead2af73fec24f40b6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8fb4c98f20dfca1237de2e3dfdbe78d156784fd3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d88540acfc7a17079021d866de914112c396edb1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e379b88a8f8cffc99b318e028705ed9e3da0e1e0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e7c0c943ed675b66d4bbb16c51c6a3bb58da047e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50473.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50473"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4ebe36c94aed95de71a8ce6a6762226d31c938ee"},{"fixed":"3cdd91a9163248935720927531066b74f57aa43b"},{"fixed":"e379b88a8f8cffc99b318e028705ed9e3da0e1e0"},{"fixed":"8fb4c98f20dfca1237de2e3dfdbe78d156784fd3"},{"fixed":"d88540acfc7a17079021d866de914112c396edb1"},{"fixed":"e7c0c943ed675b66d4bbb16c51c6a3bb58da047e"},{"fixed":"5c51054896bcce1d33d39fead2af73fec24f40b6"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"e977b1477a6725868302957e6b5c330220391797"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50473.json"}}],"schema_version":"1.7.5"}