CVE-2022-50633
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init
of_icc_get() alloc resources for path handle, we should release it when not need anymore. Like the release in dwc3_qcom_interconnect_exit() function. Add icc_put() in error handling to fix this.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's USB DWC3 Qualcomm driver occurs when interconnect initialization fails because acquired path handles are not released.
In the Linux kernel, a memory leak vulnerability exists in the DWC3 USB controller driver for Qualcomm platforms (drivers/usb/dwc3/dwc3-qcom.c). The function dwc3_qcom_interconnect_init() calls of_icc_get() to acquire interconnect path handles, but in error paths, those handles are not released. This oversight leads to a memory leak because the allocated handle resources are never freed when the initialization fails.
An attacker with local access to the system—such as root or a user capable of triggering USB subsystem resets or device probe failures—could exploit this flaw. The leak accumulates over repeated failed init attempts, depleting kernel memory. No special hardware access is needed beyond standard local user privileges [1][2].
The impact is primarily a denial-of-service scenario, where the persistent memory leak exhausts available memory, potentially causing system instability or crashes. The vulnerability does not directly allow privilege escalation or code execution, but it can degrade system reliability and availability.
The fix, committed to the Linux kernel stable tree, adds icc_put() calls in the error paths of dwc3_qcom_interconnect_init() to mirror the cleanup already performed in dwc3_qcom_interconnect_exit(). All supported stable kernel branches should backport this patch. Administrators are advised to update to the latest patched kernel version to prevent memory exhaustion [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
5f9089b95548f56f6de394f0f8c39c8d23ff92f3b51189f7a97a48da1619bVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/2f3b51189f7a7be5d822fb8c537d778c57eb9821nvd
- git.kernel.org/stable/c/56f6de394f0f57928cd401255a5c7866b68a77e3nvd
- git.kernel.org/stable/c/8c39c8d23ff9fb1beb6e16cf0ae929c764538625nvd
- git.kernel.org/stable/c/97a48da1619ba6bd42a0e5da0a03aa490a9496b1nvd
- git.kernel.org/stable/c/f9089b95548f0272e02a89989c511e235561d051nvd
News mentions
0No linked articles in our index yet.