CVE-2022-50658
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qcom | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the cpufreq: qcom memory leak in the error path. This ensures that the speedbin buffer is properly freed and prevents the memory leak.
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's cpufreq driver for Qualcomm hardware. Specifically, if the speedbin length is incorrect, the error handling code fails to free the allocated speedbin buffer, causing a memory leak. The fix ensures that the speedbin buffer is always freed in the error path.
How can this vulnerability impact me? :
The memory leak could lead to increased memory usage and potentially degrade system performance or stability over time if the error condition occurs repeatedly. However, it does not directly indicate other impacts such as code execution or data exposure.