CVE-2022-50353

Source
https://cve.org/CVERecord?id=CVE-2022-50353
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50353.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50353
Downstream
Related
Published
2025-09-17T14:56:06.761Z
Modified
2026-04-02T08:28:25.934196Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
mmc: wmt-sdmmc: fix return value check of mmc_add_host()
Details

In the Linux kernel, the following vulnerability has been resolved:

mmc: wmt-sdmmc: fix return value check of mmcaddhost()

mmcaddhost() may return error, if we ignore its return value, the memory that allocated in mmcallochost() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path.

So fix this by checking the return value and goto error path which will call mmcfreehost(), besides, clkdisableunprepare() also needs be called.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50353.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a96dff0f828ae9dfb43efd49a9b67a74c6dc360
Fixed
70b0620afab3c69d95a7e2dd7ceff162a21c4009
Fixed
ecd6f77af3478f5223aa4011642a891b7dc91228
Fixed
c7a328cea791cc2769b6417943939420913b4a46
Fixed
9bedf64dda84b29151e41591d8ded9ff0e6d336a
Fixed
58c3a8d0f1abeb1ca5c2df948be58ad4f7bb6f67
Fixed
b40ac3b696a9c84b36211ef0c3f5a422650c101b
Fixed
eb7a2d516d4fbd165c07877a20feccb047342b1f
Fixed
29276d56f6ed138db0f38cd31aedc0b725c8c76c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50353.json"