CVE-2022-50658

Source
https://cve.org/CVERecord?id=CVE-2022-50658
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50658.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50658
Downstream
Related
Published
2025-12-09T01:29:06.106Z
Modified
2026-03-12T03:26:44.687091Z
Summary
cpufreq: qcom: fix memory leak in error path
Details

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: qcom: fix memory leak in error path

If for some reason the speedbin length is incorrect, then there is a memory leak in the error path because we never free the speedbin buffer. This commit fixes the error path to always free the speedbin buffer.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50658.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a8811ec764f95a04ba82f6f457e28c5e9e36e36b
Fixed
e55feb31df3fc78b880d6e9d4b5853f05c974833
Fixed
b5606e3ab1f7cc00d89903f4a11fe57747bb3a68
Fixed
b6ea267e0c6bdf5463358e2a2e5280cfa6cacc48
Fixed
9f42cf54403a42cb092636804d2628d8ecf71e75

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50658.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.152
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.76
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50658.json"