{"id":"CVE-2022-50316","summary":"orangefs: Fix kmemleak in orangefs_sysfs_init()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: Fix kmemleak in orangefs_sysfs_init()\n\nWhen insert and remove the orangefs module, there are kobjects memory\nleaked as below:\n\nunreferenced object 0xffff88810f95af00 (size 64):\n  comm \"insmod\", pid 783, jiffies 4294813439 (age 65.512s)\n  hex dump (first 32 bytes):\n    a0 83 af 01 81 88 ff ff 08 af 95 0f 81 88 ff ff  ................\n    08 af 95 0f 81 88 ff ff 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c0000000031ab7788\u003e] kmalloc_trace+0x27/0xa0\n    [\u003c000000005a6e4dfe\u003e] orangefs_sysfs_init+0x42/0x3a0\n    [\u003c00000000722645ca\u003e] 0xffffffffa02780fe\n    [\u003c000000004232d9f7\u003e] do_one_initcall+0x87/0x2a0\n    [\u003c0000000054f22384\u003e] do_init_module+0xdf/0x320\n    [\u003c000000003263bdea\u003e] load_module+0x2f98/0x3330\n    [\u003c0000000052cd4153\u003e] __do_sys_finit_module+0x113/0x1b0\n    [\u003c00000000250ae02b\u003e] do_syscall_64+0x35/0x80\n    [\u003c00000000f11c03c7\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nunreferenced object 0xffff88810f95ae80 (size 64):\n  comm \"insmod\", pid 783, jiffies 4294813439 (age 65.512s)\n  hex dump (first 32 bytes):\n    c8 90 0f 02 81 88 ff ff 88 ae 95 0f 81 88 ff ff  ................\n    88 ae 95 0f 81 88 ff ff 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c0000000031ab7788\u003e] kmalloc_trace+0x27/0xa0\n    [\u003c000000001a4841fa\u003e] orangefs_sysfs_init+0xc7/0x3a0\n    [\u003c00000000722645ca\u003e] 0xffffffffa02780fe\n    [\u003c000000004232d9f7\u003e] do_one_initcall+0x87/0x2a0\n    [\u003c0000000054f22384\u003e] do_init_module+0xdf/0x320\n    [\u003c000000003263bdea\u003e] load_module+0x2f98/0x3330\n    [\u003c0000000052cd4153\u003e] __do_sys_finit_module+0x113/0x1b0\n    [\u003c00000000250ae02b\u003e] do_syscall_64+0x35/0x80\n    [\u003c00000000f11c03c7\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nunreferenced object 0xffff88810f95ae00 (size 64):\n  comm \"insmod\", pid 783, jiffies 4294813440 (age 65.511s)\n  hex dump (first 32 bytes):\n    60 87 a1 00 81 88 ff ff 08 ae 95 0f 81 88 ff ff  `...............\n    08 ae 95 0f 81 88 ff ff 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c0000000031ab7788\u003e] kmalloc_trace+0x27/0xa0\n    [\u003c000000005915e797\u003e] orangefs_sysfs_init+0x12b/0x3a0\n    [\u003c00000000722645ca\u003e] 0xffffffffa02780fe\n    [\u003c000000004232d9f7\u003e] do_one_initcall+0x87/0x2a0\n    [\u003c0000000054f22384\u003e] do_init_module+0xdf/0x320\n    [\u003c000000003263bdea\u003e] load_module+0x2f98/0x3330\n    [\u003c0000000052cd4153\u003e] __do_sys_finit_module+0x113/0x1b0\n    [\u003c00000000250ae02b\u003e] do_syscall_64+0x35/0x80\n    [\u003c00000000f11c03c7\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nunreferenced object 0xffff88810f95ad80 (size 64):\n  comm \"insmod\", pid 783, jiffies 4294813440 (age 65.511s)\n  hex dump (first 32 bytes):\n    78 90 0f 02 81 88 ff ff 88 ad 95 0f 81 88 ff ff  x...............\n    88 ad 95 0f 81 88 ff ff 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c0000000031ab7788\u003e] kmalloc_trace+0x27/0xa0\n    [\u003c000000007a14eb35\u003e] orangefs_sysfs_init+0x1ac/0x3a0\n    [\u003c00000000722645ca\u003e] 0xffffffffa02780fe\n    [\u003c000000004232d9f7\u003e] do_one_initcall+0x87/0x2a0\n    [\u003c0000000054f22384\u003e] do_init_module+0xdf/0x320\n    [\u003c000000003263bdea\u003e] load_module+0x2f98/0x3330\n    [\u003c0000000052cd4153\u003e] __do_sys_finit_module+0x113/0x1b0\n    [\u003c00000000250ae02b\u003e] do_syscall_64+0x35/0x80\n    [\u003c00000000f11c03c7\u003e] entry_SYSCALL_64_after_hwframe+0x46/0xb0\n\nunreferenced object 0xffff88810f95ac00 (size 64):\n  comm \"insmod\", pid 783, jiffies 4294813440 (age 65.531s)\n  hex dump (first 32 bytes):\n    e0 ff 67 02 81 88 ff ff 08 ac 95 0f 81 88 ff ff  ..g.............\n    08 ac 95 0f 81 88 ff ff 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c0000000031ab7788\u003e] kmalloc_trace+0x27/0xa0\n    [\u003c000000001f38adcb\u003e] orangefs_sysfs_init+0x291/0x3a0\n    [\u003c00000000722645ca\u003e] 0xffffffffa02780fe\n    [\u003c000000004232d9f7\u003e] do_one_initcall+0x87/0x2a0\n    [\u003c0000000054f22384\u003e] do_init_module+0xdf/0x320\n    [\u003c000000003263bdea\u003e] load_module+0x2f98/0x3330\n    [\u003c0000000052cd4153\u003e] __do_sys_finit_module+0x113/0x1b0\n    [\u003c00000000250ae02b\u003e] do_syscall_64+0x35/\n---truncated---","modified":"2026-04-02T08:28:24.842636Z","published":"2025-09-15T14:48:49.320Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50316.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1f2c0e8a587bcafad85019a2d80f158d8d41a868"},{"type":"WEB","url":"https://git.kernel.org/stable/c/22409490294180c39be7dd0e5b2667d41556307d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ce4ba7fff5af36da82dc5964221367630621b99"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50316.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50316"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f7ab093f74bf638ed98fd1115f3efa17e308bb7f"},{"fixed":"9ce4ba7fff5af36da82dc5964221367630621b99"},{"fixed":"22409490294180c39be7dd0e5b2667d41556307d"},{"fixed":"1f2c0e8a587bcafad85019a2d80f158d8d41a868"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50316.json"}}],"schema_version":"1.7.5"}