CVE-2022-50863
Memory Leak in Linux rtw89 WiFi Driver Under Power Saving
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's wifi driver (rtw89). It occurs because unused socket buffers (skb) were not freed properly, which could lead to memory being consumed unnecessarily, especially under power saving mode. The issue has been resolved by ensuring that these unused buffers are freed.
How can this vulnerability impact me? :
The vulnerability can cause a memory leak in the system when using the affected wifi driver, potentially leading to degraded system performance or instability over time, especially when the device is in power saving mode.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your Linux kernel to a version that includes the fix for the rtw89 driver memory leak issue. This will prevent the potential memory leak under power saving mode by freeing unused skb buffers.