VYPR
Unrated severityNVD Advisory· Published Dec 9, 2025· Updated Apr 15, 2026

CVE-2022-50667

CVE-2022-50667

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()

If the copy of the description string from userspace fails, then the page for the instance descriptor doesn't get freed before returning -EFAULT, which leads to a memleak.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's vmw_mksstat_add_ioctl() function occurs when copying a description string from userspace fails, leaving a page unfreed.

Vulnerability

CVE-2022-50667 describes a memory leak in the Linux kernel's Direct Rendering Manager (DRM) subsystem for VMware graphics (vmwgfx). The vulnerability resides in the vmw_mksstat_add_ioctl() function. When the kernel attempts to copy a description string from userspace, if that copy operation fails (e.g., due to an invalid pointer or memory access), the function returns -EFAULT -EFAULT` without freeing the page that was already allocated for the instance descriptor. This results in a memory leak, as the allocated page is never released back to the system [1][2].

Exploitation

To trigger this vulnerability, an attacker must have local access to the system and the ability to invoke the vmw_mksstat_add_ioctl() ioctl call, which requires appropriate privileges (typically root or CAP_SYS_ADMIN). The attack surface is limited to local users who can interact with the VMware graphics driver. The failure condition is met by providing a malformed or inaccessible userspace pointer for the description string, causing the copy operation to fail. No special hardware or network access is needed beyond local shell access [1][1][2].

Impact

A successful exploitation leads to a gradual depletion of kernel memory due to the unreleased page. Over time, this memory leak can cause system instability, denial of service (DoS), or resource exhaustion for other processes. The vulnerability does not directly allow privilege escalation or arbitrary code execution, but it can degrade system performance and availability [1][2].

Mitigation

The fix for this vulnerability was included in the Linux kernel stable releases. The patch ensures that the allocated page is freed before returning an error when the copy from userspace fails. Users should update their kernel to a version containing the commit that addresses this issue. No workaround is available other than applying the kernel update [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.