CVE-2022-50772
Description
In the Linux kernel, the following vulnerability has been resolved:
netdevsim: fix memory leak in nsim_bus_dev_new()
If device_register() failed in nsim_bus_dev_new(), the value of reference in nsim_bus_dev->dev is 1. obj->name in nsim_bus_dev->dev will not be released.
unreferenced object 0xffff88810352c480 (size 16): comm "echo", pid 5691, jiffies 4294945921 (age 133.270s) hex dump (first 16 bytes): 6e 65 74 64 65 76 73 69 6d 31 00 00 00 00 00 00 netdevsim1...... backtrace: [<000000005e2e5e26>] __kmalloc_node_track_caller+0x3a/0xb0 [<0000000094ca4fc8>] kvasprintf+0xc3/0x160 [<00000000aad09bcc>] kvasprintf_const+0x55/0x180 [<000000009bac868d>] kobject_set_name_vargs+0x56/0x150 [<000000007c1a5d70>] dev_set_name+0xbb/0xf0 [<00000000ad0d126b>] device_add+0x1f8/0x1cb0 [<00000000c222ae24>] new_device_store+0x3b6/0x5e0 [<0000000043593421>] bus_attr_store+0x72/0xa0 [<00000000cbb1833a>] sysfs_kf_write+0x106/0x160 [<00000000d0dedb8a>] kernfs_fop_write_iter+0x3a8/0x5a0 [<00000000770b66e2>] vfs_write+0x8f0/0xc80 [<0000000078bb39be>] ksys_write+0x106/0x210 [<00000000005e55a4>] do_syscall_64+0x35/0x80 [<00000000eaa40bbc>] entry_SYSCALL_64_after_hwframe+0x46/0xb0
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in Linux kernel's netdevsim driver when device_register fails, allowing local resource exhaustion.
A memory leak vulnerability exists in the netdevsim driver's nsim_bus_dev_new() function within the Linux kernel. When device_register() fails, the device name allocated via dev_set_name() is not freed, leading to a leak of the name string. This issue is evidenced by the backtrace showing allocation through kvasprintf and dev_set_name without subsequent cleanup on the error path.
The leak can be triggered by writing to the sysfs interface to create a new netdevsim device (e.g., via new_device_store). If the device registration fails due to resource constraints or other errors, the allocated name memory remains unreleased. Exploitation requires local access to the sysfs filesystem, typically with root privileges.
An attacker with local access can repeatedly trigger the memory leak, gradually exhausting kernel memory and causing a denial of service (DoS). The vulnerability does not lead to privilege escalation or data corruption.
The issue was resolved in Linux kernel commit 77579e406529 [1], which ensures proper cleanup of the device name on the failure path. Users should apply the corresponding kernel update or backport the fix to affected stable trees.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
277579e406529cf2010aa1c73Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
2News mentions
0No linked articles in our index yet.