๐Ÿ” CVE Alert

CVE-2022-50446

UNKNOWN 0.0

ARC: mm: fix leakage of memory allocated for PTE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ARC: mm: fix leakage of memory allocated for PTE Since commit d9820ff ("ARC: mm: switch pgtable_t back to struct page *") a memory leakage problem occurs. Memory allocated for page table entries not released during process termination. This issue can be reproduced by a small program that allocates a large amount of memory. After several runs, you'll see that the amount of free memory has reduced and will continue to reduce after each run. All ARC CPUs are effected by this issue. The issue was introduced since the kernel stable release v5.15-rc1. As described in commit d9820ff after switch pgtable_t back to struct page *, a pointer to "struct page" and appropriate functions are used to allocate and free a memory page for PTEs, but the pmd_pgtable macro hasn't changed and returns the direct virtual address from the PMD (PGD) entry. Than this address used as a parameter in the __pte_free() and as a result this function couldn't release memory page allocated for PTEs. Fix this issue by changing the pmd_pgtable macro and returning pointer to struct page.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
d9820ff76f95fa26d33e412254a89cd65b23142d < 14009ada5712649589ab4ad0441b811780ea8773 d9820ff76f95fa26d33e412254a89cd65b23142d < d83a69966e8b6ae9dd447f3ac704c0223bceb7f7 d9820ff76f95fa26d33e412254a89cd65b23142d < 4fd9df10cb7a9289fbd22d669f9f98164d95a1ce
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/14009ada5712649589ab4ad0441b811780ea8773 git.kernel.org: https://git.kernel.org/stable/c/d83a69966e8b6ae9dd447f3ac704c0223bceb7f7 git.kernel.org: https://git.kernel.org/stable/c/4fd9df10cb7a9289fbd22d669f9f98164d95a1ce