VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2022-50633

CVE-2022-50633

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init

of_icc_get() alloc resources for path handle, we should release it when not need anymore. Like the release in dwc3_qcom_interconnect_exit() function. Add icc_put() in error handling to fix this.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's USB DWC3 Qualcomm driver occurs when interconnect initialization fails because acquired path handles are not released.

In the Linux kernel, a memory leak vulnerability exists in the DWC3 USB controller driver for Qualcomm platforms (drivers/usb/dwc3/dwc3-qcom.c). The function dwc3_qcom_interconnect_init() calls of_icc_get() to acquire interconnect path handles, but in error paths, those handles are not released. This oversight leads to a memory leak because the allocated handle resources are never freed when the initialization fails.

An attacker with local access to the system—such as root or a user capable of triggering USB subsystem resets or device probe failures—could exploit this flaw. The leak accumulates over repeated failed init attempts, depleting kernel memory. No special hardware access is needed beyond standard local user privileges [1][2].

The impact is primarily a denial-of-service scenario, where the persistent memory leak exhausts available memory, potentially causing system instability or crashes. The vulnerability does not directly allow privilege escalation or code execution, but it can degrade system reliability and availability.

The fix, committed to the Linux kernel stable tree, adds icc_put() calls in the error paths of dwc3_qcom_interconnect_init() to mirror the cleanup already performed in dwc3_qcom_interconnect_exit(). All supported stable kernel branches should backport this patch. Administrators are advised to update to the latest patched kernel version to prevent memory exhaustion [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.