{"id":"CVE-2022-50751","summary":"configfs: fix possible memory leak in configfs_create_dir()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nconfigfs: fix possible memory leak in configfs_create_dir()\n\nkmemleak reported memory leaks in configfs_create_dir():\n\nunreferenced object 0xffff888009f6af00 (size 192):\n  comm \"modprobe\", pid 3777, jiffies 4295537735 (age 233.784s)\n  backtrace:\n    kmem_cache_alloc (mm/slub.c:3250 mm/slub.c:3256 mm/slub.c:3263 mm/slub.c:3273)\n    new_fragment (./include/linux/slab.h:600 fs/configfs/dir.c:163)\n    configfs_register_subsystem (fs/configfs/dir.c:1857)\n    basic_write (drivers/hwtracing/stm/p_basic.c:14) stm_p_basic\n    do_one_initcall (init/main.c:1296)\n    do_init_module (kernel/module/main.c:2455)\n    ...\n\nunreferenced object 0xffff888003ba7180 (size 96):\n  comm \"modprobe\", pid 3777, jiffies 4295537735 (age 233.784s)\n  backtrace:\n    kmem_cache_alloc (mm/slub.c:3250 mm/slub.c:3256 mm/slub.c:3263 mm/slub.c:3273)\n    configfs_new_dirent (./include/linux/slab.h:723 fs/configfs/dir.c:194)\n    configfs_make_dirent (fs/configfs/dir.c:248)\n    configfs_create_dir (fs/configfs/dir.c:296)\n    configfs_attach_group.isra.28 (fs/configfs/dir.c:816 fs/configfs/dir.c:852)\n    configfs_register_subsystem (fs/configfs/dir.c:1881)\n    basic_write (drivers/hwtracing/stm/p_basic.c:14) stm_p_basic\n    do_one_initcall (init/main.c:1296)\n    do_init_module (kernel/module/main.c:2455)\n    ...\n\nThis is because the refcount is not correct in configfs_make_dirent().\nFor normal stage, the refcount is changing as:\n\nconfigfs_register_subsystem()\n  configfs_create_dir()\n    configfs_make_dirent()\n      configfs_new_dirent() # set s_count = 1\n      dentry-\u003ed_fsdata = configfs_get(sd); # s_count = 2\n...\nconfigfs_unregister_subsystem()\n  configfs_remove_dir()\n    remove_dir()\n      configfs_remove_dirent() # s_count = 1\n    dput() ...\n      *dentry_unlink_inode()*\n        configfs_d_iput() # s_count = 0, release\n\nHowever, if we failed in configfs_create():\n\nconfigfs_register_subsystem()\n  configfs_create_dir()\n    configfs_make_dirent() # s_count = 2\n    ...\n    configfs_create() # fail\n    -\u003eout_remove:\n    configfs_remove_dirent(dentry)\n      configfs_put(sd) # s_count = 1\n      return PTR_ERR(inode);\n\nThere is no inode in the error path, so the configfs_d_iput() is lost\nand makes sd and fragment memory leaked.\n\nTo fix this, when we failed in configfs_create(), manually call\nconfigfs_put(sd) to keep the refcount correct.","modified":"2026-04-02T08:28:44.585958Z","published":"2025-12-24T13:05:46.159Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0617-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50751.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/07f82dca112262b169bec0001378126439cab776"},{"type":"WEB","url":"https://git.kernel.org/stable/c/74ac7c9ee2d486c501e7864c903f5098fc477acd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8bc77754224a2c8581727ffe2e958119b4e27c8f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90c38f57a821499391526b15cc944c265bd24e48"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c65234b283a65cfbfc94619655e820a5e55199eb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c72eb6e6e49a71f7598740786568fafdd013a227"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50751.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50751"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7063fbf2261194f72ee75afca67b3b38b554b5fa"},{"fixed":"90c38f57a821499391526b15cc944c265bd24e48"},{"fixed":"74ac7c9ee2d486c501e7864c903f5098fc477acd"},{"fixed":"07f82dca112262b169bec0001378126439cab776"},{"fixed":"8bc77754224a2c8581727ffe2e958119b4e27c8f"},{"fixed":"c72eb6e6e49a71f7598740786568fafdd013a227"},{"fixed":"c65234b283a65cfbfc94619655e820a5e55199eb"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50751.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.16"},{"fixed":"5.4.229"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.163"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50751.json"}}],"schema_version":"1.7.5"}