VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50821

CVE-2022-50821

Description

In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's SUNRPC module occurs when gss_read_proxy_verf() fails, which could be exploited to exhaust system memory.

Vulnerability

Description

CVE-2022-50821 describes a memory leak in the SUNRPC component of the Linux kernel. The bug occurs when the function gss_read_proxy_verf() fails, causing a dynamically allocated netobj memory object to not be freed properly [1][2]. This is a typical resource management flaw where an error path neglects to release previously allocated memory.

Attack

Vector and Prerequisites

Exploitation requires an attacker to be able to trigger a failure in gss_read_proxy_verf(). This function is involved in handling GSS-API proxy verifiers during RPC authentication. While the exact trigger conditions are not fully detailed, the vulnerability is present in code paths that process network requests, meaning a remote attacker could potentially cause the leak by sending crafted RPC messages that lead to an error [3]. No authentication is required if the service is exposed.

Impact

Repeatedly triggering this memory leak can exhaust system memory, leading to a denial of service (DoS) condition. The leaked memory is never reclaimed until the kernel is rebooted, making this a viable vector for resource exhaustion attacks against systems running the affected kernel versions.

Mitigation

The fix is included in newer Linux kernel stable releases. Users should update to a patched kernel version that incorporates the commit which properly frees netobj memory on failure [1][2][3]. No workaround is known besides applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.