-

CVE-2022-50618

In the Linux kernel, the following vulnerability has been resolved:

mmc: meson-gx: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value,
it will lead two issues:
1. The memory that allocated in mmc_alloc_host() is leaked.
2. In the remove() path, mmc_remove_host() will be called to
   delete device, but it's not added yet, it will lead a kernel
   crash because of null-ptr-deref in device_del().

Fix this by checking the return value and goto error path which
will call mmc_free_host().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < f5506e0bbb25102bd8ef2e1a3b483a0b934e454e
Version 51c5d8447bd71b7e539c19c46a03b73c0e91fa66
Status affected
Version < 9e11c6bb745be4e9b325cf96031b4ea34801342d
Version 51c5d8447bd71b7e539c19c46a03b73c0e91fa66
Status affected
Version < 64b2c441171febf075bd9632aca579afda8ab9fb
Version 51c5d8447bd71b7e539c19c46a03b73c0e91fa66
Status affected
Version < e0cfe7aa41f3965f5224affd88afd48c60f6ad1f
Version 51c5d8447bd71b7e539c19c46a03b73c0e91fa66
Status affected
Version < 42343e3c6195e934b9cb4c08b7ff84a3778d77f9
Version 51c5d8447bd71b7e539c19c46a03b73c0e91fa66
Status affected
Version < f5ce76aeddf01ca8f2a80fc37119388d59db7c10
Version 51c5d8447bd71b7e539c19c46a03b73c0e91fa66
Status affected
Version < 90935f16f2650ab7416fa2ffbe5c28cb39cf3f1e
Version 51c5d8447bd71b7e539c19c46a03b73c0e91fa66
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.10
Status affected
Version < 4.10
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String