CVE-2022-50523

In the Linux kernel, the following vulnerability has been resolved: clk: rockchip: Fix memory leak in rockchip_clk_register_pll() If clk_register() fails, @pll->rate_table may have allocated memory by kmemdup(), so it needs to be freed, otherwise will cause memory leak issue, this patch fixes it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

04 Feb 2026, 16:57

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/20201c3a0a32f127fa4bdf379d6ac01c2978702d - () https://git.kernel.org/stable/c/20201c3a0a32f127fa4bdf379d6ac01c2978702d - Patch
References () https://git.kernel.org/stable/c/26b94635f1c84d7f6cb482179125cb17e59c90a5 - () https://git.kernel.org/stable/c/26b94635f1c84d7f6cb482179125cb17e59c90a5 - Patch
References () https://git.kernel.org/stable/c/5b0a1f1247cd42ac5e0d369f8dbb58762692edee - () https://git.kernel.org/stable/c/5b0a1f1247cd42ac5e0d369f8dbb58762692edee - Patch
References () https://git.kernel.org/stable/c/739a6a6bbdb793bd57938cb24aa5a6df89983546 - () https://git.kernel.org/stable/c/739a6a6bbdb793bd57938cb24aa5a6df89983546 - Patch
References () https://git.kernel.org/stable/c/86e1e080ad14c5fb6c14a5f0eb530b1b38cbc968 - () https://git.kernel.org/stable/c/86e1e080ad14c5fb6c14a5f0eb530b1b38cbc968 - Patch
References () https://git.kernel.org/stable/c/dcd4ba068b194c6ef0071491aa3f12bec8c14d5b - () https://git.kernel.org/stable/c/dcd4ba068b194c6ef0071491aa3f12bec8c14d5b - Patch
References () https://git.kernel.org/stable/c/f02c1d8dc8d880cbaaf9094b4f396fe868ee23ff - () https://git.kernel.org/stable/c/f02c1d8dc8d880cbaaf9094b4f396fe868ee23ff - Patch
References () https://git.kernel.org/stable/c/f2ffb8653ea85ae39ce44347751fcc4c3e41f6bb - () https://git.kernel.org/stable/c/f2ffb8653ea85ae39ce44347751fcc4c3e41f6bb - Patch
References () https://git.kernel.org/stable/c/f4d70c139d313948e02360304a6cbcd3a4f5deb5 - () https://git.kernel.org/stable/c/f4d70c139d313948e02360304a6cbcd3a4f5deb5 - Patch
CWE CWE-401
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

07 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-07 16:15

Updated : 2026-02-04 16:57


NVD link : CVE-2022-50523

Mitre link : CVE-2022-50523

CVE.ORG link : CVE-2022-50523


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime