CVE-2022-50660
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ipw2200: fix memory leak in ipw_wdev_init()
In the error path of ipw_wdev_init(), exception value is returned, and the memory applied for in the function is not released. Also the memory is not released in ipw_pci_probe(). As a result, memory leakage occurs. So memory release needs to be added to the error path of ipw_wdev_init().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in Linux kernel's ipw2200 Wi-Fi driver due to unreleased memory in error path of ipw_wdev_init().
Vulnerability
A memory leak vulnerability exists in the Linux kernel's Intel PRO/Wireless 2200 (ipw2200) Wi-Fi driver. In the function ipw_wdev_init(), when an error occurs, the allocated memory is not freed before returning an exception value. Furthermore, the calling function ipw_pci_probe() also does not release this memory, leading to a cumulative memory leak over time [1][2][3].
Exploitation
The vulnerability is triggered during device initialization when an error path is taken in ipw_wdev_init(). No special privileges or user interaction are required; an attacker would need to be able to trigger the error condition, which could occur naturally during normal operation or potentially via crafted inputs that cause initialization failures.
Impact
A local attacker could exploit this memory leak to exhaust system memory resources, leading to a denial-of-service (DoS) condition. Over repeated reloads of the driver or on systems with limited memory, this could cause instability or crash the system.
Mitigation
The issue is fixed by adding proper memory cleanup in the error paths of ipw_wdev_init(). Patches have been committed to the Linux kernel stable tree [1][2][3]. Users should update to a kernel version containing these fixes or apply the relevant backport.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
875d20ba9506efb3517b92a45112c1af02b8f8a2eb9d9d0c19424ea9d557e62ec7e8bf42f1f590fb3d14e9fe21dc62611Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/112c1af02b8f535baf42ef9d807aea963705ef15nvd
- git.kernel.org/stable/c/1f590fb3d14e5db3a9e06ee141b1685c429278cenvd
- git.kernel.org/stable/c/62ec7e8bf42f1542f966dda687c654aae81718c8nvd
- git.kernel.org/stable/c/75d20ba9506eb90d92e660e04dd887ff1495fcc3nvd
- git.kernel.org/stable/c/8a2eb9d9d0c1535bc8e22840193bff4cdcac878bnvd
- git.kernel.org/stable/c/9424ea9d557ef41d86eb40b6349ae991c3dcff89nvd
- git.kernel.org/stable/c/9fe21dc626117fb44a8eb393713a86a620128ce3nvd
- git.kernel.org/stable/c/fb3517b92a45c8004ac26250ae041a24eb23fef1nvd
News mentions
0No linked articles in our index yet.