CVE-2022-50834
Description
In the Linux kernel, the following vulnerability has been resolved:
nfc: Fix potential resource leaks
nfc_get_device() take reference for the device, add missing nfc_put_device() to release it when not need anymore. Also fix the style warnning by use error EOPNOTSUPP instead of ENOTSUPP.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing nfc_put_device() calls in the Linux kernel's NFC subsystem could lead to reference leaks, fixed by adding proper cleanup.
Vulnerability
Description
CVE-2022-50834 addresses a resource leak in the Linux kernel's NFC (Near Field Communication) subsystem. The function nfc_get_device() takes an additional reference on a device, but in certain code paths that reference was not released with a corresponding nfc_put_device() call, potentially leading to reference count leaks and dangling device objects [1][2][3].
Exploitation
Exploitation requires that an attacker trigger code paths in the NFC subsystem where nfc_get_device() is called without the matching nfc_put_device(). In the absence of proper cleanup, the device reference count remains elevated, causing the device to never be freed. While there is no direct mechanism for arbitrary code execution, a local attacker with access to NFC interfaces could cause a denial-of-service condition by exhausting kernel memory through repeated reference leaks.
Impact
The primary impact is a denial of service due to memory exhaustion. An unprivileged local user could cause the kernel to leak small amounts of memory each time the vulnerable code path is triggered. Over time, this could lead to system instability or a complete denial of service. No privilege escalation or remote exploitation is indicated.
Mitigation
The fix was included in the Linux kernel stable releases with commits [1][2][3]. Administrators should apply the latest stable kernel updates to ensure the missing nfc_put_device() calls are added. There is no workaround other than applying the patch or disabling the NFC subsystem if not needed.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
8277f0d0a9084d1d912e7f82dd8e410315ad3e0f5c962c066b63bc2db244ca743128fca39b32f6bef2485df49908f3c52Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/277f0d0a9084e7454e5532c823a7a876a7b00af7nvd
- git.kernel.org/stable/c/a743128fca394a43425020a4f287d3168d94d04fnvd
- git.kernel.org/stable/c/b32f6bef248562bb5191ada527717ea50b319466nvd
- git.kernel.org/stable/c/b63bc2db244c1b57e36f16ea5f2a1becda413f68nvd
- git.kernel.org/stable/c/d1d912e7f82d7216ba4e266048ec1d1f5ea93839nvd
- git.kernel.org/stable/c/d8e410315ad393b23520b5db0706be853589c548nvd
- git.kernel.org/stable/c/df49908f3c52d211aea5e2a14a93bbe67a2cb3afnvd
- git.kernel.org/stable/c/e0f5c962c066e769c187f037fedc883f8abd4e82nvd
News mentions
0No linked articles in our index yet.