-

CVE-2022-50769

In the Linux kernel, the following vulnerability has been resolved:

mmc: mxcmmc: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and goto error path which will call
mmc_free_host().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 5f35c038c9f4d258b3cf77885a2730f1417d63e7
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < 1cf0c1e58738b97e2de207846105b6a5d46622ee
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < b8bdb3fd13d5cd1e86d22fd3f803a742fd88af89
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < 32eb502c972dfc34413c9147418b3d94d870c2b8
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < 3904eb97bb78fdca3e16d30a38ce5697b9686110
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < 2d496050ded83b13b16f05e1fc0329b0210d2493
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < d37474ab9a79149075f0823315c6d45dd983a78c
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < d2ead18bc7cc166220cab5a744a05c5b69431a12
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
Version < cde600af7b413c9fe03e85c58c4279df90e91d13
Version d96be879ff469759af6d7fcebdb66237c18da6f8
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.29
Status affected
Version < 2.6.29
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.146
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.