CVE-2022-50863
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: free unused skb to prevent memory leak
This avoid potential memory leak under power saving mode.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in rtw89 WiFi driver due to not freeing unused skb under power saving mode.
In the Linux kernel's rtw89 WiFi driver, an allocated skb (socket buffer) is not freed when the device enters power saving mode. This omission leads to a gradual memory leak over time.
The vulnerability is triggerable by a local user or process that can control the wireless interface's power management state. No special privileges beyond network access may be required, as power saving transitions can occur automatically.
Repeated power saving transitions cause the driver to leak memory, eventually exhausting system memory and leading to denial of service (system hang or crash).
The fix was applied in Linux kernel stable updates, specifically committing the change to free the unused skb in the rtw89 driver. Users should update to a patched kernel version.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3d4b4f6ff8ff1216c59b66f2deae672f38604Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.