-
CVE-2022-50251
- EPSS 0.04%
- Veröffentlicht 15.09.2025 14:02:12
- Zuletzt bearbeitet 15.09.2025 15:21:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So fix this by checking the return value and goto error path which will call mmc_free_host(), besides, the timer added before mmc_add_host() needs be del. And this patch fixes another missing call mmc_free_host() if usb_control_msg() fails.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
41ed46bdbd2878cd6567abe0974a445f8b1b8ec8
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
25f05d762ca5e1c685002a53dd44f68e78ca3feb
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
a46e681151bbdacdf6b89ee8c4e5bad0555142bb
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
3b29f8769d32016b2d89183db4d80c7a71b7e35e
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
3049a3b927a40d89d4582ff1033cd7953be773c7
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
afc898019e7bf18c5eb7a0ac19852fcb1b341b3c
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
c9e85979b59cb86f0a15defa8199d740e2b36b90
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
2044b2ea77945f372ef161d1bbf814e471767ff2
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
Version <
0613ad2401f88bdeae5594c30afe318e93b14676
Version
88095e7b473a3d9ec3b9c60429576e9cbd327c89
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.0
Status
affected
Version <
3.0
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|