CVE-2022-50637
Description
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut()
If "cpu_dev" fails to get opp table in qcom_cpufreq_hw_read_lut(), the program will return, resulting in "table" resource is not released.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's QCOM cpufreq driver occurs when opp table retrieval fails, leaving allocated memory unreleased.
Vulnerability
In the Linux kernel's Qualcomm hardware cpufreq driver, the function qcom_cpufreq_hw_read_lut() allocates memory for a table resource. If the call to get the operating performance points (OPP) table for cpu_dev fails, the function returns early without freeing the previously allocated table, causing a memory leak [1][2].
Exploitation
This vulnerability is triggered during the cpufreq driver initialization when reading the lookup table (LUT) from hardware. An attacker would need local to the system could potentially cause the OPP table retrieval to fail, leading to repeated memory leaks over time. No special privileges beyond local access are required to trigger the code path, though the exact conditions for failure depend on system state.
Impact
An attacker who can repeatedly trigger the error path can exhaust kernel memory, leading to denial of service (DoS) conditions. The leak is small per occurrence but can accumulate, potentially causing system instability or crashes.
Mitigation
The fix has been applied in the Linux kernel stable tree. Users should update to a kernel version containing the commit that releases the table resource before returning before the error return [1][2]. No workaround is available other than applying the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
53ef12a4a8ef54ea765b106245d430076e66b242e23be8f319901c21bcaf2Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/242e23be8f31ebd90525c57ee3244c28e99a1697nvd
- git.kernel.org/stable/c/3ef12a4a8ef5553af9c3fd2719a616637a102568nvd
- git.kernel.org/stable/c/4ea765b10624d67407817100d381c60f53593033nvd
- git.kernel.org/stable/c/5d430076e66bddd08612911513b36f932b0d9d6cnvd
- git.kernel.org/stable/c/9901c21bcaf2f01fe5078f750d624f4ddfa8f81bnvd
News mentions
0No linked articles in our index yet.