-

CVE-2022-50353

In the Linux kernel, the following vulnerability has been resolved:

mmc: wmt-sdmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and goto error path which will call
mmc_free_host(), besides, clk_disable_unprepare() also needs be called.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 70b0620afab3c69d95a7e2dd7ceff162a21c4009
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
Version < ecd6f77af3478f5223aa4011642a891b7dc91228
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
Version < c7a328cea791cc2769b6417943939420913b4a46
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
Version < 9bedf64dda84b29151e41591d8ded9ff0e6d336a
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
Version < 58c3a8d0f1abeb1ca5c2df948be58ad4f7bb6f67
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
Version < b40ac3b696a9c84b36211ef0c3f5a422650c101b
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
Version < eb7a2d516d4fbd165c07877a20feccb047342b1f
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
Version < 29276d56f6ed138db0f38cd31aedc0b725c8c76c
Version 3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.8
Status affected
Version < 3.8
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String