CVE-2022-50667
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()
If the copy of the description string from userspace fails, then the page for the instance descriptor doesn't get freed before returning -EFAULT, which leads to a memleak.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's vmw_mksstat_add_ioctl() function occurs when copying a description string from userspace fails, leaving a page unfreed.
Vulnerability
CVE-2022-50667 describes a memory leak in the Linux kernel's Direct Rendering Manager (DRM) subsystem for VMware graphics (vmwgfx). The vulnerability resides in the vmw_mksstat_add_ioctl() function. When the kernel attempts to copy a description string from userspace, if that copy operation fails (e.g., due to an invalid pointer or memory access), the function returns -EFAULT -EFAULT` without freeing the page that was already allocated for the instance descriptor. This results in a memory leak, as the allocated page is never released back to the system [1][2].
Exploitation
To trigger this vulnerability, an attacker must have local access to the system and the ability to invoke the vmw_mksstat_add_ioctl() ioctl call, which requires appropriate privileges (typically root or CAP_SYS_ADMIN). The attack surface is limited to local users who can interact with the VMware graphics driver. The failure condition is met by providing a malformed or inaccessible userspace pointer for the description string, causing the copy operation to fail. No special hardware or network access is needed beyond local shell access [1][1][2].
Impact
A successful exploitation leads to a gradual depletion of kernel memory due to the unreleased page. Over time, this memory leak can cause system instability, denial of service (DoS), or resource exhaustion for other processes. The vulnerability does not directly allow privilege escalation or arbitrary code execution, but it can degrade system performance and availability [1][2].
Mitigation
The fix for this vulnerability was included in the Linux kernel stable releases. The patch ensures that the allocated page is freed before returning an error when the copy from userspace fails. Users should update their kernel to a version containing the commit that addresses this issue. No workaround is available other than applying the kernel update [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
4b47a37ad4a446ad40bbb2c2553066b144715a40c7f61d12fVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.