CVE-2022-50165

In the Linux kernel, the following vulnerability has been resolved: wifi: wil6210: debugfs: fix uninitialized variable use in `wil_write_file_wmi()` Commit 7a4836560a61 changes simple_write_to_buffer() with memdup_user() but it forgets to change the value to be returned that came from simple_write_to_buffer() call. It results in the following warning: warning: variable 'rc' is uninitialized when used here [-Wuninitialized] return rc; ^~ Remove rc variable and just return the passed in length if the memdup_user() succeeds.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Nov 2025, 19:48

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/409bd72e544fdf4809ea0dac337bb5a1f11a25a9 - () https://git.kernel.org/stable/c/409bd72e544fdf4809ea0dac337bb5a1f11a25a9 - Patch
References () https://git.kernel.org/stable/c/52b11a48cf073e0aab923ae809a765d756cecf13 - () https://git.kernel.org/stable/c/52b11a48cf073e0aab923ae809a765d756cecf13 - Patch
References () https://git.kernel.org/stable/c/689e5caf63e99e15d2f485ec297c1bf9243e0e28 - () https://git.kernel.org/stable/c/689e5caf63e99e15d2f485ec297c1bf9243e0e28 - Patch
References () https://git.kernel.org/stable/c/6c5fee83bdbeffe8d607d1ab125122a75f40bd1a - () https://git.kernel.org/stable/c/6c5fee83bdbeffe8d607d1ab125122a75f40bd1a - Patch
References () https://git.kernel.org/stable/c/b13c84e877d7a3095bacb14665db304b2c00e95f - () https://git.kernel.org/stable/c/b13c84e877d7a3095bacb14665db304b2c00e95f - Patch
References () https://git.kernel.org/stable/c/c9fde3a44da566d8929070ab6bda4f0dfa9955d0 - () https://git.kernel.org/stable/c/c9fde3a44da566d8929070ab6bda4f0dfa9955d0 - Patch
References () https://git.kernel.org/stable/c/d4742c886043b69d2d058bfde3998ef333b66595 - () https://git.kernel.org/stable/c/d4742c886043b69d2d058bfde3998ef333b66595 - Patch
References () https://git.kernel.org/stable/c/d578e0af3a003736f6c440188b156483d451b329 - () https://git.kernel.org/stable/c/d578e0af3a003736f6c440188b156483d451b329 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: wil6210: debugfs: se corrige el uso de variables no inicializadas en `wil_write_file_wmi()`. El commit 7a4836560a61 cambia `simple_write_to_buffer()` por `memdup_user()`, pero olvida cambiar el valor devuelto que proviene de la llamada `simple_write_to_buffer()`. Esto genera la siguiente advertencia: `advertencia: la variable `rc' no está inicializada cuando se usa aquí` [-Wuninitialized] return rc; ^~ Se elimina la variable `rc` y se devuelve solo la longitud introducida si `memdup_user()` se ejecuta correctamente.
CWE CWE-908
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

18 Jun 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-18 11:15

Updated : 2025-11-17 19:48


NVD link : CVE-2022-50165

Mitre link : CVE-2022-50165

CVE.ORG link : CVE-2022-50165


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource