-

CVE-2022-50653

In the Linux kernel, the following vulnerability has been resolved:

mmc: atmel-mci: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value,
it will lead two issues:
1. The memory that allocated in mmc_alloc_host() is leaked.
2. In the remove() path, mmc_remove_host() will be called to
   delete device, but it's not added yet, it will lead a kernel
   crash because of null-ptr-deref in device_del().

So fix this by checking the return value and calling mmc_free_host()
in the error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 99a6cdfa2cf05028b52f6d8ee85ccc5f8b71b4a2
Version 7d2be0749a59096a334c94dc48f43294193cb8ed
Status affected
Version < 6bb26abb92f25e582a0976091a10b539fe3796db
Version 7d2be0749a59096a334c94dc48f43294193cb8ed
Status affected
Version < 00ac0f5f95920f003cd6ece53cdc759549b69118
Version 7d2be0749a59096a334c94dc48f43294193cb8ed
Status affected
Version < 1925472dec31ec061d57412b3a65a056ea24f340
Version 7d2be0749a59096a334c94dc48f43294193cb8ed
Status affected
Version < cc8bb436f3c842a86b9082d97933582120d180e2
Version 7d2be0749a59096a334c94dc48f43294193cb8ed
Status affected
Version < 85946ceb0fac20ab39cdb85333086daf0291a553
Version 7d2be0749a59096a334c94dc48f43294193cb8ed
Status affected
Version < 9e6e8c43726673ca2abcaac87640b9215fd72f4c
Version 7d2be0749a59096a334c94dc48f43294193cb8ed
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.27
Status affected
Version < 2.6.27
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String