-

CVE-2022-50886

In the Linux kernel, the following vulnerability has been resolved:

mmc: toshsd: fix return value check of mmc_add_host()

mmc_add_host() may return error, if we ignore its return value, the memory
that allocated in mmc_alloc_host() will be leaked and it will lead a kernel
crash because of deleting not added device in the remove path.

So fix this by checking the return value and goto error path which will call
mmc_free_host(), besides, free_irq() also needs be called.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 34ae492f8d172f0bd193c24cad588b35419ea47a
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < 3329e7b7132ca727263fb0ee214cf52cc6dcaaad
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < 4f6cb1c685f9e20a4a9fa565e442f5af4dad70ff
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < 3dbb69a0242c31ea4c9eee22b1c41b515fe509a0
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < aabbedcb6c9a72d12d35dc672e83f0c8064d8a61
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < 6444079767b68b1fbed0e7668081146e80dcb719
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < 647e370dd0ef7e212d8d014bda748e461eab2e8c
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < bfd77b194c94aefbde4efc30ddf8607dd9244672
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
Version < f670744a316ea983113a65313dcd387b5a992444
Version a5eb8bbd66ccf9f169419f9652544aec771b7c57
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.19
Status affected
Version < 3.19
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.145
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.