VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50863

CVE-2022-50863

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: free unused skb to prevent memory leak

This avoid potential memory leak under power saving mode.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Memory leak in rtw89 WiFi driver due to not freeing unused skb under power saving mode.

In the Linux kernel's rtw89 WiFi driver, an allocated skb (socket buffer) is not freed when the device enters power saving mode. This omission leads to a gradual memory leak over time.

The vulnerability is triggerable by a local user or process that can control the wireless interface's power management state. No special privileges beyond network access may be required, as power saving transitions can occur automatically.

Repeated power saving transitions cause the driver to leak memory, eventually exhausting system memory and leading to denial of service (system hang or crash).

The fix was applied in Linux kernel stable updates, specifically committing the change to free the unused skb in the rtw89 driver. Users should update to a patched kernel version.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.