CVE-2022-50644Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.1%
top 80.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync() will increment pm usage counter. Forgetting to putting operation will result in reference leak. Add missing pm_runtime_put_sync in some error paths.

Affected Packages4 packages

Linuxlinux/linux_kernel3.16.04.9.331+7
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux9ac33b0ce81fa48dd39e7ddfc1bf4519052181dd27abe45df1dc394c184688d816cbbf2f194d4c6a+9
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
OSV
clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe2025-12-09
OSV
CVE-2022-50644: In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sync2025-12-09
GHSA
GHSA-5r54-5x94-v4vr: In the Linux kernel, the following vulnerability has been resolved: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe pm_runtime_get_sy2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe2025-12-09
Debian
CVE-2022-50644: linux - In the Linux kernel, the following vulnerability has been resolved: clk: ti: dr...2022