VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2022-50713

CVE-2022-50713

Description

In the Linux kernel, the following vulnerability has been resolved:

clk: visconti: Fix memory leak in visconti_register_pll()

@pll->rate_table has allocated memory by kmemdup(), if clk_hw_register() fails, it should be freed, otherwise it will cause memory leak issue, this patch fixes it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in Linux kernel's visconti_register_pll() could cause resource exhaustion if clk_hw_register() fails after rate table allocation.

The vulnerability resides in the visconti_register_pll() function in the clock driver for the Visconti architecture. The function allocates memory for @pll->rate_table via kmemdup() but fails to free it when clk_hw_register() returns an error. This oversight results in a memory leak each time the registration fails, depleting system memory over time. [1]

Exploitation requires local access and the ability to trigger a failure in clk_hw_register(). This could be achieved by inducing memory pressure or other error conditions during clock registration. The attacker does not need special privileges beyond normal user access if the system permits interacting with the clock subsystem.

The immediate impact is memory exhaustion, leading to denial of service (system hang or crash). While not directly exploitable for code execution, the leak could corrupt memory if reused, potentially leading to information disclosure, though that is not confirmed.

The fix was introduced in the Linux kernel stable tree via commit f0f1982ddfb4. Users are advised to apply the patch or update to a kernel version containing the fix. There is no known workaround.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.