U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-50415 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: parisc: led: Fix potential null-ptr-deref in start_task() start_task() calls create_singlethread_workqueue() and not checked the ret value, which may return NULL. And a null-ptr-deref may happen: start_task() create_singlethread_workqueue() # failed, led_wq is NULL queue_delayed_work() queue_delayed_work_on() __queue_delayed_work() # warning here, but continue __queue_work() # access wq->flags, null-ptr-deref Check the ret value and return -ENOMEM if it is NULL.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/3505c187b86136250b39e62c72a3a70435277af6 kernel.org
https://git.kernel.org/stable/c/41f563ab3c33698bdfc3403c7c2e6c94e73681e4 kernel.org
https://git.kernel.org/stable/c/5e4500454d75dd249be4695d83afa3ba0724c37e kernel.org
https://git.kernel.org/stable/c/67c98fec87ed76b1feb2ae810051afd88dfa9df6 kernel.org
https://git.kernel.org/stable/c/77f8b628affaec692d83ad8bfa3520db8a0cc493 kernel.org
https://git.kernel.org/stable/c/ac838c663ba1fd6bff35a817fd89a47ab55e88e0 kernel.org
https://git.kernel.org/stable/c/c6db0c32f39684c89c97bc1ba1c9c4249ca09e48 kernel.org
https://git.kernel.org/stable/c/fc307b2905a3dd75c50a53b4d87ac9c912fb7c4e kernel.org
https://git.kernel.org/stable/c/fc6d0f65f22040c6cc8a5ce032bf90252629de50 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-50415
NVD Published Date:
09/18/2025
NVD Last Modified:
09/18/2025
Source:
kernel.org