Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2022-50169 First vendor Publication 2025-06-18
Vendor Cve Last vendor Modification 2025-06-18

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()

The simple_write_to_buffer() function will succeed if even a single byte is initialized. However, we need to initialize the whole buffer to prevent information leaks. Just use memdup_user().

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50169

Sources (Detail)

https://git.kernel.org/stable/c/05ceda14ef7c73104e709c414c3680d8a59f51d4
https://git.kernel.org/stable/c/074e865b37da55aa87baa16d68b96896f85f8adb
https://git.kernel.org/stable/c/4615458db7793fadc6d546ac3564b36819e77a22
https://git.kernel.org/stable/c/60c9983425167ec5073c628d83a6875760d18059
https://git.kernel.org/stable/c/67470920cd3f3cb38699b1ad23234f96bead4d21
https://git.kernel.org/stable/c/789edc1af9c1a2293956e8534bfef3d18d629de9
https://git.kernel.org/stable/c/7a4836560a6198d245d5732e26f94898b12eb760
https://git.kernel.org/stable/c/c1216e699a1ce83ea005510844bd7508d34c6cef
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-06-18 17:20:33
  • First insertion