{"id":"CVE-2022-50639","summary":"io-wq: Fix memory leak in worker creation","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nio-wq: Fix memory leak in worker creation\n\nIf the CPU mask allocation for a node fails, then the memory allocated for\nthe 'io_wqe' struct of the current node doesn't get freed on the error\nhandling path, since it has not yet been added to the 'wqes' array.\n\nThis was spotted when fuzzing v6.1-rc1 with Syzkaller:\nBUG: memory leak\nunreferenced object 0xffff8880093d5000 (size 1024):\n  comm \"syz-executor.2\", pid 7701, jiffies 4295048595 (age 13.900s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n  backtrace:\n    [\u003c00000000cb463369\u003e] __kmem_cache_alloc_node+0x18e/0x720\n    [\u003c00000000147a3f9c\u003e] kmalloc_node_trace+0x2a/0x130\n    [\u003c000000004e107011\u003e] io_wq_create+0x7b9/0xdc0\n    [\u003c00000000c38b2018\u003e] io_uring_alloc_task_context+0x31e/0x59d\n    [\u003c00000000867399da\u003e] __io_uring_add_tctx_node.cold+0x19/0x1ba\n    [\u003c000000007e0e7a79\u003e] io_uring_setup.cold+0x1b80/0x1dce\n    [\u003c00000000b545e9f6\u003e] __x64_sys_io_uring_setup+0x5d/0x80\n    [\u003c000000008a8a7508\u003e] do_syscall_64+0x5d/0x90\n    [\u003c000000004ac08bec\u003e] entry_SYSCALL_64_after_hwframe+0x63/0xcd","modified":"2026-04-02T08:28:41.159874Z","published":"2025-12-09T00:00:12.576Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50639.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/996d3efeb091c503afd3ee6b5e20eabf446fd955"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b6e2c54be37d5eb4f6666e6aa59cd0581c7ffc3c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed981911a7c90a604f4a2bee908ab07e3b786aca"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50639.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50639"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0e03496d1967abf1ebb151a24318c07d07f41f7f"},{"fixed":"b6e2c54be37d5eb4f6666e6aa59cd0581c7ffc3c"},{"fixed":"ed981911a7c90a604f4a2bee908ab07e3b786aca"},{"fixed":"996d3efeb091c503afd3ee6b5e20eabf446fd955"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50639.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.14.0"},{"fixed":"5.15.75"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50639.json"}}],"schema_version":"1.7.5"}