CVE-2022-50550
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's blk-iolatency component. It occurs when a gendisk is initialized successfully but the add_disk() function fails, such as when a loop device has an invalid number of minor device numbers. In this case, blkcg_init_disk() initializes iolatency, but during error handling, blkcg_exit_disk() does not clean it up properly, causing a memory leak. The issue arises because iolatency is initialized before add_disk() is called, unlike other rq_qos policies that are cleaned up later. The fix involves adding an extra call to rq_qos_exit() during error handling to ensure proper cleanup.
How can this vulnerability impact me? :
This vulnerability can lead to a memory leak in the Linux kernel when certain disk initialization failures occur. Over time, this memory leak could degrade system performance or stability, potentially causing resource exhaustion or crashes if the leak is significant and persistent.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation involves applying the fix that adds an extra call to rq_qos_exit() in blkcg_exit_disk() to ensure proper cleanup of iolatency on add_disk() failures. This fix prevents the memory leak by safely handling duplicate calls to rq_qos_exit(). Therefore, updating the Linux kernel to a version that includes this patch is the recommended immediate step.