CVE-2022-50708
Description
In the Linux kernel, the following vulnerability has been resolved:
HSI: ssi_protocol: fix potential resource leak in ssip_pn_open()
ssip_pn_open() claims the HSI client's port with hsi_claim_port(). When hsi_register_port_event() gets some error and returns a negetive value, the HSI client's port should be released with hsi_release_port().
Fix it by calling hsi_release_port() when hsi_register_port_event() fails.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel HSI subsystem, ssip_pn_open() fails to release a claimed port on error, causing a resource leak.
Vulnerability
CVE-2022-50708 is a resource leak vulnerability in the Linux kernel's HSI (High-Speed Synchronous Serial Interface) subsystem, specifically in the ssip_pn_open() function of the ssi_protocol module. The function claims the HSI client's port via hsi_claim_port() but does not release it if a subsequent call to hsi_register_port_event() fails. This missing release path can lead to a resource leak, leaving the port permanently claimed and unavailable for other consumers [1][2].
Exploitation
Exploitation requires only that the error path in hsi_register_port_event() be triggered, which can occur during normal systemically due to transient resource constraints or configuration issues. No special privileges are needed beyond the ability to open the HSI protocol port are needed, making the attack surface accessible from user space or through device initialization [1].
Impact
An attacker or system condition that consistently triggers the error can exhaust available HSI ports, leading to denial of service (DoS) for any functionality relying on HSI communication. The leaked port will remain in a claimed state until the kernel is rebooted, as there is no automatic cleanup mechanism [2].
Mitigation
The fix, incorporated into the Linux kernel stable tree, adds a call to hsi_release_port() in the error path of ssip_pn_open() before returning. Users should apply the relevant kernel updates from their distribution to eliminate the leak [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
378b0ef14896fe78b45b3eeeeb28dbcb379e6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.