CVE-2022-50321

Source
https://cve.org/CVERecord?id=CVE-2022-50321
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50321.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50321
Downstream
Related
Published
2025-09-15T14:48:54.808Z
Modified
2026-04-11T12:44:55.786014Z
Summary
wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix potential memory leak in brcmfnetdevstart_xmit()

The brcmfnetdevstartxmit() returns NETDEVTXOK without freeing skb in case of pskbexpandhead() fails, add devkfree_skb() to fix it. Compile tested only.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50321.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
270a6c1f65fe68a28a5d39cd405592c550b496c7
Fixed
4c55fdebc1c358de96bfab52ed309d58a3ba66ef
Fixed
e5d01e85cf46628647cd696cb72ba4659b18967f
Fixed
d869a189505224601e310c7769cb90b0e2f60b31
Fixed
e08e6812efb6a8c676e733de0518594d1517e0d9
Fixed
e8ef89e5b89ee041a94eecfb6c31fcc237f9168c
Fixed
7f159116d620615779adbf88a5d94713702216d8
Fixed
3a4d18318f473e97d628f410215b3fac32d07aed
Fixed
212fde3fe76e962598ce1d47b97cc78afdfc71b3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50321.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.13.0
Fixed
4.14.308
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.276
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.235
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.173
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.99
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.16
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50321.json"