CVE-2022-50644
Description
In the Linux kernel, the following vulnerability has been resolved:
clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe
pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting operation will result in reference leak. Add missing pm_runtime_put_sync in some error paths.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reference leak in the Linux kernel's DRA7 ATL clock driver, where pm_runtime_get_sync() is not balanced with pm_runtime_put_sync() in error paths, could lead to resource exhaustion.
Vulnerability
Overview
CVE-2022-50644 is a reference leak vulnerability in the Linux kernel's clk: ti: dra7-atl driver. The root cause is that the function of_dra7_atl_clk_probe() calls pm_runtime_get_sync() to increment the PM usage counter, but in certain error paths the corresponding pm_runtime_put_sync() is missing. This oversight means that when an error occurs during probe, the PM runtime reference count is not decrement is skipped, causing a permanent imbalance.
Exploitation and
Impact
An attacker would need to trigger an error condition in the DRA7 ATL clock probe path, which could be achieved by loading the driver on a system with the DRA7 hardware or by manipulating device tree entries. No special privileges are required beyond the ability to cause the driver to probe (e.g., via hotplug or module loading). The impact is a gradual depletion of the PM runtime reference count, which can prevent the device from entering low-power states and may eventually lead to resource exhaustion or denial of service. The vulnerability does not allow arbitrary code execution or privilege escalation.
Mitigation
The fix was applied in the Linux kernel stable tree with commits [1], [2], and [3], and [3], which add the missing pm_runtime_put_sync() calls in the error paths. Users should update to a kernel version containing these patches. No workarounds are documented; the issue is resolved by applying the kernel update.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
927abe45df1dcd84f77ef7d5725fe7b0d596bfc39ebf85d036d01017247ee3441076f83aaa9f69663ad57c01ae99a4e3a9c59a01caba2Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/25fe7b0d596b343e7a5504ba11767115fff8494fnvd
- git.kernel.org/stable/c/27abe45df1dc394c184688d816cbbf2f194d4c6anvd
- git.kernel.org/stable/c/3441076f83aace85f5d6ccd9ffb301ac6b874776nvd
- git.kernel.org/stable/c/6d01017247eee3fba399f601b0bcb38e4fb88a72nvd
- git.kernel.org/stable/c/9c59a01caba26ec06fefd6ca1f22d5fd1de57d63nvd
- git.kernel.org/stable/c/a9f69663ad571cbd7814dde38e3fcb4876341ed6nvd
- git.kernel.org/stable/c/c01ae99a4e3a0cdf70f7cd758a60a2243eac562cnvd
- git.kernel.org/stable/c/d84f77ef7d57658d7346f8c4797a570aa5e35fa6nvd
- git.kernel.org/stable/c/fc39ebf85d0349366b807fe2be848041c8523f03nvd
News mentions
0No linked articles in our index yet.