CVE-2022-50661Improper Update of Reference Count in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: seccomp: Move copy_seccomp() to no failure path. Our syzbot instance reported memory leaks in do_seccomp() [0], similar to the report [1]. It shows that we miss freeing struct seccomp_filter and some objects included in it. We can reproduce the issue with the program below [2] which calls one seccomp() and two clone() syscalls. The first clone()d child exits earlier than its parent and sends a signal to kill it during the se

Affected Packages4 packages

Linuxlinux/linux_kernel5.9.05.10.180+3
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux3a15fb6ed92cb32b0a83f406aa4a96f28c9adbc3d4a895e924b486f2a38463114509e1088ef4d7f5+5
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-256c-6mf5-7f9p: In the Linux kernel, the following vulnerability has been resolved: seccomp: Move copy_seccomp() to no failure path2025-12-09
OSV
seccomp: Move copy_seccomp() to no failure path.2025-12-09
OSV
CVE-2022-50661: In the Linux kernel, the following vulnerability has been resolved: seccomp: Move copy_seccomp() to no failure path2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: seccomp: Move copy_seccomp() to no failure path2025-12-09
Debian
CVE-2022-50661: linux - In the Linux kernel, the following vulnerability has been resolved: seccomp: Mo...2022