CVE-2022-50658
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom: fix memory leak in error path If for some reason the speedbin length is incorrect, then there is a memory leak in the error path because we never free the speedbin buffer. This commit fixes the error path to always free the speedbin buffer.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
qcom linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the cpufreq: qcom memory leak in the error path. This ensures that the speedbin buffer is properly freed and prevents the memory leak.


Can you explain this vulnerability to me?

This vulnerability is a memory leak in the Linux kernel's cpufreq driver for Qualcomm hardware. Specifically, if the speedbin length is incorrect, the error handling code fails to free the allocated speedbin buffer, causing a memory leak. The fix ensures that the speedbin buffer is always freed in the error path.


How can this vulnerability impact me? :

The memory leak could lead to increased memory usage and potentially degrade system performance or stability over time if the error condition occurs repeatedly. However, it does not directly indicate other impacts such as code execution or data exposure.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart