CVE-2022-50832
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()
The wilc_mac_xmit() returns NETDEV_TX_OK without freeing skb, add dev_kfree_skb() to fix it. Compile tested only.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's wilc1000 WiFi driver, a missing skb free in wilc_mac_xmit() leads to a memory leak, fixed by adding dev_kfree_skb().
Vulnerability
A memory leak vulnerability exists in the Linux kernel's wilc1000 wireless driver. The function wilc_mac_xmit() is responsible for transmitting network packets, but when it returns NETDEV_TX_OK, it does not free the associated socket buffer (skb). This omission causes the skb to remain allocated indefinitely, creating a persistent memory leak [1].
Exploitation
Context
This bug is triggered during normal network packet transmission on systems using the wilc1000 driver. No special authentication or network position is required beyond being able to send network traffic over a wilc1000 interface. The leak accumulates over time as packets are transmitted, eventually degrading system performance due to memory exhaustion [1].
Impact
An attacker with the ability to send network traffic through network traffic over a vulnerable system can cause a denial-of-service (DoS) condition by exhausting available kernel memory. The lack of skb freeing means each transmitted packet leaks kernel memory, which can lead to system instability or crash if left unmitigated [1].
Mitigation
Status
The fix is merged into the Linux kernel stable branches via commit 5706d00fde3f (among others). Affected users should update to a kernel version containing this patch. There is no known workaround other than applying the patch or avoiding use of the wilc1000 driver [2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
6a12610e83789a1e94fb4d09d5706d00fde3f07dcd756e28fbaef42df7de7deb962ec9e1cVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/07dcd756e28f27e4f8fcd8b809ffa05a5cc5de2bnvd
- git.kernel.org/stable/c/5706d00fde3f1d5eb7296a4dfefb6aea35108224nvd
- git.kernel.org/stable/c/a12610e83789c838493034e5c50ac5c903ad8c0dnvd
- git.kernel.org/stable/c/a1e94fb4d09d0fcfeaa73aa49d787f06c42db7eenvd
- git.kernel.org/stable/c/baef42df7de7c35ba60b75a5f96d1eb039f4d782nvd
- git.kernel.org/stable/c/deb962ec9e1c9a81babd3d37542ad4bd6ac3396envd
News mentions
0No linked articles in our index yet.