CVE-2022-50523
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.10 (inc) to 4.14.303 (inc) |
| rockchip | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's rockchip clock driver. Specifically, if the clk_register() function fails during the registration of a PLL (phase-locked loop) clock, the allocated memory for the rate_table is not freed, causing a memory leak. The patch fixes this by ensuring the allocated memory is properly freed when clk_register() fails.
How can this vulnerability impact me? :
The memory leak caused by this vulnerability can lead to increased memory usage over time, potentially degrading system performance or causing resource exhaustion in systems using the affected rockchip clock driver in the Linux kernel.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that fixes the memory leak in the rockchip_clk_register_pll() function in the Linux kernel. This patch ensures that allocated memory by kmemdup() is properly freed if clk_register() fails, preventing the memory leak.