-

CVE-2022-50165

In the Linux kernel, the following vulnerability has been resolved:

wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()`

Commit 7a4836560a61 changes simple_write_to_buffer() with memdup_user()
but it forgets to change the value to be returned that came from
simple_write_to_buffer() call. It results in the following warning:

  warning: variable 'rc' is uninitialized when used here [-Wuninitialized]
           return rc;
                  ^~

Remove rc variable and just return the passed in length if the
memdup_user() succeeds.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < b13c84e877d7a3095bacb14665db304b2c00e95f
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < c9fde3a44da566d8929070ab6bda4f0dfa9955d0
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 52b11a48cf073e0aab923ae809a765d756cecf13
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 6c5fee83bdbeffe8d607d1ab125122a75f40bd1a
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 689e5caf63e99e15d2f485ec297c1bf9243e0e28
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < d4742c886043b69d2d058bfde3998ef333b66595
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 409bd72e544fdf4809ea0dac337bb5a1f11a25a9
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < d578e0af3a003736f6c440188b156483d451b329
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.17
Status affected
Version < 3.17
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.291
Status unaffected
Version <= 4.19.*
Version 4.19.256
Status unaffected
Version <= 5.4.*
Version 5.4.211
Status unaffected
Version <= 5.10.*
Version 5.10.137
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.094
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string