-

CVE-2022-50347

In the Linux kernel, the following vulnerability has been resolved:

mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and calling mmc_free_host() in the
error path, besides, led_classdev_unregister() and pm_runtime_disable() also
need be called.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < d7ad7278be401b09c9f9a9f522cf4c449c7fd489
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < e598c9683fe1cf97c2b11b800cc3cee072108220
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < 89303ddbb502c3bc8edbf864f9f85500c8fe07e9
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < 937112e991ed25d1727d878734adcbef3b900274
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < 7fa922c7a3dd623fd59f1af50e8896fd9ca7f654
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < df683201c7ffbd21a806a7cad657b661c5ebfb6f
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < 1491667d5450778a265eddddd294219acfd648cb
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < a522e26a20a43dcfbef9ee9f71ed803290e852b0
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
Version < fc38a5a10e9e5a75eb9189854abeb8405b214cc9
Version c7f6558d84afe60016b8103c0737df6e376a1c2d
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.16
Status affected
Version < 3.16
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String