CVE-2022-50821
Description
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's SUNRPC module occurs when gss_read_proxy_verf() fails, which could be exploited to exhaust system memory.
Vulnerability
Description
CVE-2022-50821 describes a memory leak in the SUNRPC component of the Linux kernel. The bug occurs when the function gss_read_proxy_verf() fails, causing a dynamically allocated netobj memory object to not be freed properly [1][2]. This is a typical resource management flaw where an error path neglects to release previously allocated memory.
Attack
Vector and Prerequisites
Exploitation requires an attacker to be able to trigger a failure in gss_read_proxy_verf(). This function is involved in handling GSS-API proxy verifiers during RPC authentication. While the exact trigger conditions are not fully detailed, the vulnerability is present in code paths that process network requests, meaning a remote attacker could potentially cause the leak by sending crafted RPC messages that lead to an error [3]. No authentication is required if the service is exposed.
Impact
Repeatedly triggering this memory leak can exhaust system memory, leading to a denial of service (DoS) condition. The leaked memory is never reclaimed until the kernel is rebooted, making this a viable vector for resource exhaustion attacks against systems running the affected kernel versions.
Mitigation
The fix is included in newer Linux kernel stable releases. Users should update to a patched kernel version that incorporates the commit which properly frees netobj memory on failure [1][2][3]. No workaround is known besides applying the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
776f2497a2faaaa91afe597402cd6026e2573d01fa993eb7f67eb848161c2c9ded831e255da522b5fe1a5Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/2cd6026e257362f030c8be57abaf7fc0049df60anvd
- git.kernel.org/stable/c/67eb848161c2799f2007968ea3bc87adb15c9567nvd
- git.kernel.org/stable/c/76f2497a2faa6a4e91efb94a7f55705b403273fdnvd
- git.kernel.org/stable/c/aa91afe597401b78baa7d751c71eedb92c80bd4dnvd
- git.kernel.org/stable/c/c9ded831e2552b9c3cab7e2591a190e94f9d29c0nvd
- git.kernel.org/stable/c/d01fa993eb7fbc305f0a9c3e8bfac6513efc13b6nvd
- git.kernel.org/stable/c/da522b5fe1a5f8b7c20a0023e87b52a150e53bf5nvd
News mentions
0No linked articles in our index yet.