CVE-2022-50269
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.12 (inc) to 5.15.99 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.16 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability is a memory leak in the Linux kernel when the vkms module installation fails. Over time, this could lead to increased memory usage and potentially degrade system performance or stability if the leak occurs repeatedly.
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's vkms module during its initialization (vkms_init). When vkms_init() calls vkms_create(), it does not check if vkms_create() fails. If vkms_create() fails, the memory allocated for the configuration at the start of vkms_init() is not freed, causing a memory leak.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the vkms module's memory leak issue in vkms_init() has been fixed. This involves applying the patch that checks the return value of vkms_create() and frees the allocated config if an error occurs. Avoid using the vulnerable vkms module version until the fix is applied.