PT-2025-38171 · Linux · Linux

Published

2025-09-17

·

Updated

2025-09-17

·

CVE-2022-50361

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.

In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: add missing unregister netdev() in wilc netdev ifc init()

Fault injection test reports this issue:

kernel BUG at net/core/dev.c:10731!

invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI

Call Trace:

<TASK>

wilc netdev ifc init+0x19f/0x220 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5]

wilc cfg80211 init+0x30c/0x380 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5]

wilc bus probe+0xad/0x2b0 [wilc1000 spi 1520a7539b6589cc6cde2ae826a523a33f8bacff]

spi probe+0xe4/0x140

really probe+0x17e/0x3f0

driver probe device+0xe3/0x170

driver probe device+0x49/0x120

The root case here is alloc ordered workqueue() fails, but

cfg80211 unregister netdevice() or unregister netdev() not be called in

error handling path. To fix add unregister netdev goto lable to add the

unregister operation in error handling path.

Related Identifiers

CVE-2022-50361

Affected Products

Linux