-
CVE-2022-50347
- EPSS 0.04%
- Veröffentlicht 16.09.2025 16:11:39
- Zuletzt bearbeitet 17.09.2025 14:18:55
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So fix this by checking the return value and calling mmc_free_host() in the error path, besides, led_classdev_unregister() and pm_runtime_disable() also need be called.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
d7ad7278be401b09c9f9a9f522cf4c449c7fd489
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
e598c9683fe1cf97c2b11b800cc3cee072108220
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
89303ddbb502c3bc8edbf864f9f85500c8fe07e9
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
937112e991ed25d1727d878734adcbef3b900274
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
7fa922c7a3dd623fd59f1af50e8896fd9ca7f654
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
df683201c7ffbd21a806a7cad657b661c5ebfb6f
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
1491667d5450778a265eddddd294219acfd648cb
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
a522e26a20a43dcfbef9ee9f71ed803290e852b0
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
Version <
fc38a5a10e9e5a75eb9189854abeb8405b214cc9
Version
c7f6558d84afe60016b8103c0737df6e376a1c2d
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.16
Status
affected
Version <
3.16
Version
0
Status
unaffected
Version <=
4.9.*
Version
4.9.337
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|