๐Ÿ” CVE Alert

CVE-2022-50289

UNKNOWN 0.0

ocfs2: fix memory leak in ocfs2_stack_glue_init()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix memory leak in ocfs2_stack_glue_init() ocfs2_table_header should be free in ocfs2_stack_glue_init() if ocfs2_sysfs_init() failed, otherwise kmemleak will report memleak. BUG: memory leak unreferenced object 0xffff88810eeb5800 (size 128): comm "modprobe", pid 4507, jiffies 4296182506 (age 55.888s) hex dump (first 32 bytes): c0 40 14 a0 ff ff ff ff 00 00 00 00 01 00 00 00 .@.............. 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000001e59e1cd>] __register_sysctl_table+0xca/0xef0 [<00000000c04f70f7>] 0xffffffffa0050037 [<000000001bd12912>] do_one_initcall+0xdb/0x480 [<0000000064f766c9>] do_init_module+0x1cf/0x680 [<000000002ba52db0>] load_module+0x6441/0x6f20 [<000000009772580d>] __do_sys_finit_module+0x12f/0x1c0 [<00000000380c1f22>] do_syscall_64+0x3f/0x90 [<000000004cf473bc>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3878f110f71a0971ff7acc15dd6db711b6ef37c6 < 0000281f019111526f7abccc61f2746d2eb626ca 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < 802abe2bc654e87334e6a0ab6c1adc2b6d5f6394 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < b0822faebd79971617abd495beb2d6f5356b88bf 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < 7c8bf45cea9c8d6fb3e14d8cd5ae60e0372f39b7 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < f5f2682d3a34dd8350bf63f232d885fd95f25b92 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < 61d68cf2ba79128c48d4b3fa4d10c34dc18ba572 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < 6f6c13776cbee4b6a515f4cd3b859f046be4f6f9 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < 0b2128b70849f2728949babfc1c760096ef72f5d 3878f110f71a0971ff7acc15dd6db711b6ef37c6 < 13b6269dd022aaa69ca8d1df374ab327504121cf
Linux / Linux
2.6.26

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0000281f019111526f7abccc61f2746d2eb626ca git.kernel.org: https://git.kernel.org/stable/c/802abe2bc654e87334e6a0ab6c1adc2b6d5f6394 git.kernel.org: https://git.kernel.org/stable/c/b0822faebd79971617abd495beb2d6f5356b88bf git.kernel.org: https://git.kernel.org/stable/c/7c8bf45cea9c8d6fb3e14d8cd5ae60e0372f39b7 git.kernel.org: https://git.kernel.org/stable/c/f5f2682d3a34dd8350bf63f232d885fd95f25b92 git.kernel.org: https://git.kernel.org/stable/c/61d68cf2ba79128c48d4b3fa4d10c34dc18ba572 git.kernel.org: https://git.kernel.org/stable/c/6f6c13776cbee4b6a515f4cd3b859f046be4f6f9 git.kernel.org: https://git.kernel.org/stable/c/0b2128b70849f2728949babfc1c760096ef72f5d git.kernel.org: https://git.kernel.org/stable/c/13b6269dd022aaa69ca8d1df374ab327504121cf