[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025123045-CVE-2022-50854-2aec@gregkh>
Date: Tue, 30 Dec 2025 13:19:50 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50854: nfc: virtual_ncidev: Fix memory leak in virtual_nci_send()
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
nfc: virtual_ncidev: Fix memory leak in virtual_nci_send()
skb should be free in virtual_nci_send(), otherwise kmemleak will report
memleak.
Steps for reproduction (simulated in qemu):
cd tools/testing/selftests/nci
make
./nci_dev
BUG: memory leak
unreferenced object 0xffff888107588000 (size 208):
comm "nci_dev", pid 206, jiffies 4294945376 (age 368.248s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<000000008d94c8fd>] __alloc_skb+0x1da/0x290
[<00000000278bc7f8>] nci_send_cmd+0xa3/0x350
[<0000000081256a22>] nci_reset_req+0x6b/0xa0
[<000000009e721112>] __nci_request+0x90/0x250
[<000000005d556e59>] nci_dev_up+0x217/0x5b0
[<00000000e618ce62>] nfc_dev_up+0x114/0x220
[<00000000981e226b>] nfc_genl_dev_up+0x94/0xe0
[<000000009bb03517>] genl_family_rcv_msg_doit.isra.14+0x228/0x2d0
[<00000000b7f8c101>] genl_rcv_msg+0x35c/0x640
[<00000000c94075ff>] netlink_rcv_skb+0x11e/0x350
[<00000000440cfb1e>] genl_rcv+0x24/0x40
[<0000000062593b40>] netlink_unicast+0x43f/0x640
[<000000001d0b13cc>] netlink_sendmsg+0x73a/0xbf0
[<000000003272487f>] __sys_sendto+0x324/0x370
[<00000000ef9f1747>] __x64_sys_sendto+0xdd/0x1b0
[<000000001e437841>] do_syscall_64+0x3f/0x90
The Linux kernel CVE team has assigned CVE-2022-50854 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.12 with commit e624e6c3e777fb3dfed036b9da4d433aee3608a5 and fixed in 5.15.77 with commit 88e879c9f59511174ef0ab1a3c9c83e2dbf8a213
Issue introduced in 5.12 with commit e624e6c3e777fb3dfed036b9da4d433aee3608a5 and fixed in 6.0.7 with commit 2c46a9a5f0b1c7341aa67667801079f3ff571678
Issue introduced in 5.12 with commit e624e6c3e777fb3dfed036b9da4d433aee3608a5 and fixed in 6.1 with commit e840d8f4a1b323973052a1af5ad4edafcde8ae3d
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-50854
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/nfc/virtual_ncidev.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/88e879c9f59511174ef0ab1a3c9c83e2dbf8a213
https://git.kernel.org/stable/c/2c46a9a5f0b1c7341aa67667801079f3ff571678
https://git.kernel.org/stable/c/e840d8f4a1b323973052a1af5ad4edafcde8ae3d
Powered by blists - more mailing lists