-
CVE-2022-50353
- EPSS 0.03%
- Veröffentlicht 17.09.2025 14:56:06
- Zuletzt bearbeitet 18.09.2025 13:43:34
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: mmc: wmt-sdmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So fix this by checking the return value and goto error path which will call mmc_free_host(), besides, clk_disable_unprepare() also needs be called.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
70b0620afab3c69d95a7e2dd7ceff162a21c4009
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
Version <
ecd6f77af3478f5223aa4011642a891b7dc91228
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
Version <
c7a328cea791cc2769b6417943939420913b4a46
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
Version <
9bedf64dda84b29151e41591d8ded9ff0e6d336a
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
Version <
58c3a8d0f1abeb1ca5c2df948be58ad4f7bb6f67
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
Version <
b40ac3b696a9c84b36211ef0c3f5a422650c101b
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
Version <
eb7a2d516d4fbd165c07877a20feccb047342b1f
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
Version <
29276d56f6ed138db0f38cd31aedc0b725c8c76c
Version
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.8
Status
affected
Version <
3.8
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|