CVE-2022-50776
Description
In the Linux kernel, the following vulnerability has been resolved:
clk: st: Fix memory leak in st_of_quadfs_setup()
If st_clk_register_quadfs_pll() fails, @lock should be freed before goto @err_exit, otherwise will cause meory leak issue, fix it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's ST clock driver could occur when st_clk_register_quadfs_pll() fails, leaving the @lock variable unfreed.
Vulnerability
Incorrect Error Handling Causes Memory Leak
CVE-2022-50776 describes a memory leak in the Linux kernel's ST clock driver (clk: st), specifically in the function st_of_quadfs_setup(). The vulnerability arises because when the call to st_clk_register_quadfs_pll() fails, the code does not free the @lock variable before jumping to the @err_exit error-handling label. This oversight can lead to a memory leak over time. [1][2]
##Attack Vector and Preconditions
Exploitation requires that the kernel be configured with the affected driver (CONFIG_CLK_ST) and that a failure occurs during the registration of a quadfs PLL. This can happen due to hardware errors, resource exhaustion, or possibly through deliberate triggering by an attacker who can influence clock initialization—such as by hot-plugging or manipulating device tree data. No special privileges beyond the ability to trigger clock registration are needed, though the attacker must be able to cause the allocation of @lock and then induce a failure in st_clk_register_quadfs_pll(). [1][2]
##Impact
If an attacker can repeatedly cause repeated failures, the kernel's memory will be gradually exhausted (denial of service). The leak itself, leading to system instability or crash. Since this is a kernel memory leak, it could potentially be combined with other vulnerabilities or used as a component in a more complex attack, but the primary risk is denial of service. [1][2]
##Mitigation
The fix, which ensures @lock is freed before the error exit, has been applied to the Linux kernel stable trees. Users should update to a kernel version that includes the commit adf6a00859d0 or later. No workaround other than patching is available. [1][2][3][4]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
9081538ae5817f0295209de45be0387500762713ad301c2d4efd025f32fceadf6a00859d0335ef7546c77f4731395d6dbcfd3ffb36f0dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- git.kernel.org/stable/c/081538ae5817631a2b99e8e75cce981060aab29fnvd
- git.kernel.org/stable/c/335ef7546c77e63154d6ea4d603b11274a85900envd
- git.kernel.org/stable/c/713ad301c2d49e88fe586b57ebac8f220a98e162nvd
- git.kernel.org/stable/c/adf6a00859d014cecf046dc91f75c0e65a544360nvd
- git.kernel.org/stable/c/be03875007621fcee96e6f9fd7b9e59c8dfcf6fanvd
- git.kernel.org/stable/c/cfd3ffb36f0d566846163118651d868e607300banvd
- git.kernel.org/stable/c/efd025f32fce27a8ada9bcb4731e8a84476e5b3dnvd
- git.kernel.org/stable/c/f0295209de457049a4a5f3e3985528391bd1ab34nvd
- git.kernel.org/stable/c/f4731395d6db850127634197863aede188d8e9denvd
News mentions
0No linked articles in our index yet.