DEBIAN-CVE-2022-50361

Source
https://security-tracker.debian.org/tracker/CVE-2022-50361
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50361.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2022-50361
Upstream
Published
2025-09-17T15:15:34.867Z
Modified
2025-12-10T11:15:49.519172Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: add missing unregisternetdev() in wilcnetdevifcinit() Fault injection test reports this issue: kernel BUG at net/core/dev.c:10731! invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI Call Trace: <TASK> wilcnetdevifcinit+0x19f/0x220 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5] wilccfg80211init+0x30c/0x380 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5] wilcbusprobe+0xad/0x2b0 [wilc1000spi 1520a7539b6589cc6cde2ae826a523a33f8bacff] spiprobe+0xe4/0x140 reallyprobe+0x17e/0x3f0 __driverprobedevice+0xe3/0x170 driverprobedevice+0x49/0x120 The root case here is allocorderedworkqueue() fails, but cfg80211unregisternetdevice() or unregisternetdev() not be called in error handling path. To fix add unregisternetdev goto lable to add the unregister operation in error handling path.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50361.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50361.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.20-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50361.json"