VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54050

CVE-2023-54050

Description

In the Linux kernel, the following vulnerability has been resolved:

ubifs: Fix memleak when insert_old_idx() failed

Following process will cause a memleak for copied up znode:

dirty_cow_znode zn = copy_znode(c, znode); err = insert_old_idx(c, zbr->lnum, zbr->offs); if (unlikely(err)) return ERR_PTR(err); // No one refers to zn.

Fetch a reproducer in [Link].

Function copy_znode() is split into 2 parts: resource allocation and znode replacement, insert_old_idx() is split in similar way, so resource cleanup could be done in error handling path without corrupting metadata(mem & disk). It's okay that old index inserting is put behind of add_idx_dirt(), old index is used in layout_leb_in_gaps(), so the two processes do not depend on each other.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory leak in the Linux kernel's UBIFS filesystem occurs when insert_old_idx() fails after copying a znode, leaving the copy unreferenced.

Vulnerability

In the Linux kernel's UBIFS filesystem, a memory leak vulnerability exists in the dirty_cow_znode function. When copy_znode() allocates a new znode and insert_old_idx() subsequently fails, the newly copied znode (zn) is not freed, causing a memory leak [1]. The root cause is that the error handling path does not clean up the allocated znode when the old index insertion fails.

Exploitation

An attacker would need to trigger a failure in insert_old_idx() during a write operation that causes copy-on-write of a znode. This could be achieved by exhausting memory or inducing an error in the underlying storage layer. No special privileges are required beyond the ability to write to a UBIFS filesystem, which is typically accessible to unprivileged users on systems with UBIFS mounts.

Impact

Repeated exploitation leads to gradual memory exhaustion, potentially causing system instability or denial of service denial. The leak is per-operation, so sustained triggering can deplete kernel memory over time.

Mitigation

The fix splits copy_znode() into allocation and replacement phases, and similarly splits insert_old_idx() so that resource cleanup can occur without corrupting metadata. The patch has been applied to address this vulnerability has been applied to the stable kernel tree [1][2][3][4]. Users should update to ares should update to a kernel version containing the fix.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.