CVE-2022-50750
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure
In case mipi_dsi_attach() fails, call drm_panel_remove() to avoid memory leak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in Linux kernel's sitronix-st7701 panel driver when mipi_dsi_attach() fails; missing drm_panel_remove() leads to unreleased panel resources.
What the vulnerability is
The vulnerability resides in the probe function of the DRM panel driver for Sitronix ST7701 (panel-sitronix-st7701). When mipi_dsi_attach() fails, the previously registered panel via drm_panel_add() is not removed, causing a memory leak and leaving stale references. The fix adds a call to drm_panel_remove() in the error path. [1][2][3]
How it is exploited
The condition is triggered if the MIPI DSI attach operation fails, which can occur due to hardware malfunctions or maliciously crafted DSI peripherals. An attacker with physical or local access to manipulate device connection may cause repeated probe failures, exacerbating the leak. No authentication is required as the kernel performs the probe automatically.
Impact
The memory leak results in gradual depletion of kernel memory, potentially leading to system slowdowns or denial of service. No evidence suggests that the leak can be exploited for code execution or privilege escalation.
Mitigation
The fix has been merged into multiple Linux kernel stable branches (commits 13fc167e1645, 0b7c47b7f358, 23fddf78eac8) [1][2][3]. Users are advised to update their kernels to incorporate the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
60b7c47b7f358576828e59a0e13fc167e164523fddf78eac8465611e81258c62102165dd7Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/0b7c47b7f358f932159a9d5beec9616ef8a0c6b4nvd
- git.kernel.org/stable/c/13fc167e1645c43c631d7752d98e377f0e4cbb15nvd
- git.kernel.org/stable/c/23fddf78eac8d79c56f93ab69b6c47a0816967c9nvd
- git.kernel.org/stable/c/465611e812587e72bf235034edce0e51be3d6809nvd
- git.kernel.org/stable/c/576828e59a0e03bbc763872912b04f3e3a1b3311nvd
- git.kernel.org/stable/c/c62102165dd79284d42383d2f7ed17301bd8e629nvd
News mentions
0No linked articles in our index yet.