-

CVE-2022-50169

In the Linux kernel, the following vulnerability has been resolved:

wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()

The simple_write_to_buffer() function will succeed if even a single
byte is initialized.  However, we need to initialize the whole buffer
to prevent information leaks.  Just use memdup_user().

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < c1216e699a1ce83ea005510844bd7508d34c6cef
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 4615458db7793fadc6d546ac3564b36819e77a22
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 60c9983425167ec5073c628d83a6875760d18059
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 05ceda14ef7c73104e709c414c3680d8a59f51d4
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 074e865b37da55aa87baa16d68b96896f85f8adb
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 789edc1af9c1a2293956e8534bfef3d18d629de9
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 67470920cd3f3cb38699b1ad23234f96bead4d21
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
Version < 7a4836560a6198d245d5732e26f94898b12eb760
Version ff974e4083341383d3dd4079e52ed30f57f376f0
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.17
Status affected
Version < 3.17
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.291
Status unaffected
Version <= 4.19.*
Version 4.19.256
Status unaffected
Version <= 5.4.*
Version 5.4.211
Status unaffected
Version <= 5.10.*
Version 5.10.137
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.094
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string