CVE-2022-50751
Memory Leak in Linux Kernel configfs_create_dir() Function
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's configfs subsystem, specifically in the configfs_create_dir() function. The issue arises because the reference count (refcount) is not correctly managed when configfs_create_dir() fails. Normally, the reference count is incremented and decremented properly during directory creation and removal, but if configfs_create_dir() fails, the cleanup path does not correctly release the reference, causing memory allocated for certain objects to be leaked.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for memory leaks reported by the Linux kernel's kmemleak tool, specifically looking for unreferenced objects related to configfs_create_dir(). You can enable kmemleak and check its reports using the following commands: 1. Enable kmemleak (if not already enabled): echo scan > /sys/kernel/debug/kmemleak 2. Check kmemleak reports: cat /sys/kernel/debug/kmemleak Look for entries mentioning 'configfs_create_dir' or 'modprobe' with unreferenced objects indicating memory leaks. This approach helps identify if the vulnerable code path is causing leaks on your system.
How can this vulnerability impact me? :
The impact of this vulnerability is a possible memory leak in the Linux kernel, which can lead to increased memory usage over time. This could degrade system performance or stability, especially on systems that frequently create and remove configfs directories or modules. In extreme cases, it could contribute to resource exhaustion.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by correcting the reference count handling in the configfs_create_dir() function in the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for this issue, which manually calls configfs_put(sd) when configfs_create() fails to prevent memory leaks.