CVE-2022-50169

Source
https://cve.org/CVERecord?id=CVE-2022-50169
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50169.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50169
Downstream
Related
Published
2025-06-18T11:03:22.397Z
Modified
2026-04-03T13:14:49.368435087Z
Summary
wifi: wil6210: debugfs: fix info leak in wil_write_file_wmi()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: wil6210: debugfs: fix info leak in wilwritefile_wmi()

The simplewritetobuffer() function will succeed if even a single byte is initialized. However, we need to initialize the whole buffer to prevent information leaks. Just use memdupuser().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50169.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ff974e4083341383d3dd4079e52ed30f57f376f0
Fixed
c1216e699a1ce83ea005510844bd7508d34c6cef
Fixed
4615458db7793fadc6d546ac3564b36819e77a22
Fixed
60c9983425167ec5073c628d83a6875760d18059
Fixed
05ceda14ef7c73104e709c414c3680d8a59f51d4
Fixed
074e865b37da55aa87baa16d68b96896f85f8adb
Fixed
789edc1af9c1a2293956e8534bfef3d18d629de9
Fixed
67470920cd3f3cb38699b1ad23234f96bead4d21
Fixed
7a4836560a6198d245d5732e26f94898b12eb760

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50169.json"