-
CVE-2022-50267
- EPSS 0.02%
- Veröffentlicht 15.09.2025 14:21:03
- Zuletzt bearbeitet 15.09.2025 15:22:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: mmc: rtsx_pci: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So fix this by checking the return value and calling mmc_free_host() in the error path, beside, runtime PM also needs be disabled.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
30dc645461dfc63e52b3af8ee4a98e17bf14bacf
Version
ff984e57d36e8ac468849a144a36f1c11f88b61c
Status
affected
Version <
5cd4e04eccaec140da6fa04db056a76282ee6852
Version
ff984e57d36e8ac468849a144a36f1c11f88b61c
Status
affected
Version <
ffa9b2a79e3e959683efbad3f6db937eca9d38f5
Version
ff984e57d36e8ac468849a144a36f1c11f88b61c
Status
affected
Version <
0c87db77423a282b3b38b8a6daf057b822680516
Version
ff984e57d36e8ac468849a144a36f1c11f88b61c
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.8
Status
affected
Version <
3.8
Version
0
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.047 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|