CVE-2022-50854

Source
https://cve.org/CVERecord?id=CVE-2022-50854
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50854.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50854
Downstream
Published
2025-12-30T12:15:29.792Z
Modified
2026-03-10T21:50:26.322345Z
Summary
nfc: virtual_ncidev: Fix memory leak in virtual_nci_send()
Details

In the Linux kernel, the following vulnerability has been resolved:

nfc: virtualncidev: Fix memory leak in virtualnci_send()

skb should be free in virtualncisend(), otherwise kmemleak will report memleak.

Steps for reproduction (simulated in qemu): cd tools/testing/selftests/nci make ./nci_dev

BUG: memory leak unreferenced object 0xffff888107588000 (size 208): comm "nci_dev", pid 206, jiffies 4294945376 (age 368.248s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<000000008d94c8fd>] __allocskb+0x1da/0x290 [<00000000278bc7f8>] ncisendcmd+0xa3/0x350 [<0000000081256a22>] ncireset_req+0x6b/0xa0 [<000000009e721112>] __ncirequest+0x90/0x250 [<000000005d556e59>] ncidevup+0x217/0x5b0 [<00000000e618ce62>] nfcdevup+0x114/0x220 [<00000000981e226b>] nfcgenldevup+0x94/0xe0 [<000000009bb03517>] genlfamilyrcvmsgdoit.isra.14+0x228/0x2d0 [<00000000b7f8c101>] genlrcvmsg+0x35c/0x640 [<00000000c94075ff>] netlinkrcvskb+0x11e/0x350 [<00000000440cfb1e>] genlrcv+0x24/0x40 [<0000000062593b40>] netlinkunicast+0x43f/0x640 [<000000001d0b13cc>] netlink_sendmsg+0x73a/0xbf0 [<000000003272487f>] __sys_sendto+0x324/0x370 [<00000000ef9f1747>] __x64syssendto+0xdd/0x1b0 [<000000001e437841>] dosyscall64+0x3f/0x90

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50854.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e624e6c3e777fb3dfed036b9da4d433aee3608a5
Fixed
88e879c9f59511174ef0ab1a3c9c83e2dbf8a213
Fixed
2c46a9a5f0b1c7341aa67667801079f3ff571678
Fixed
e840d8f4a1b323973052a1af5ad4edafcde8ae3d

Affected versions

v5.*
v5.11
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v6.*
v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.1-rc1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50854.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.12.0
Fixed
5.15.77
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50854.json"