{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50267","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-15T13:58:00.975Z","datePublished":"2025-09-15T14:21:03.372Z","dateUpdated":"2026-05-11T19:16:00.926Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:16:00.926Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: rtsx_pci: fix return value check of mmc_add_host()\n\nmmc_add_host() may return error, if we ignore its return value, the memory\nthat allocated in mmc_alloc_host() will be leaked and it will lead a kernel\ncrash because of deleting not added device in the remove path.\n\nSo fix this by checking the return value and calling mmc_free_host() in the\nerror path, beside, runtime PM also needs be disabled."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/rtsx_pci_sdmmc.c"],"versions":[{"version":"ff984e57d36e8ac468849a144a36f1c11f88b61c","lessThan":"30dc645461dfc63e52b3af8ee4a98e17bf14bacf","status":"affected","versionType":"git"},{"version":"ff984e57d36e8ac468849a144a36f1c11f88b61c","lessThan":"5cd4e04eccaec140da6fa04db056a76282ee6852","status":"affected","versionType":"git"},{"version":"ff984e57d36e8ac468849a144a36f1c11f88b61c","lessThan":"ffa9b2a79e3e959683efbad3f6db937eca9d38f5","status":"affected","versionType":"git"},{"version":"ff984e57d36e8ac468849a144a36f1c11f88b61c","lessThan":"0c87db77423a282b3b38b8a6daf057b822680516","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/mmc/host/rtsx_pci_sdmmc.c"],"versions":[{"version":"3.8","status":"affected"},{"version":"0","lessThan":"3.8","status":"unaffected","versionType":"semver"},{"version":"5.15.86","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.16","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.2","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"5.15.86"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.0.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.1.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/30dc645461dfc63e52b3af8ee4a98e17bf14bacf"},{"url":"https://git.kernel.org/stable/c/5cd4e04eccaec140da6fa04db056a76282ee6852"},{"url":"https://git.kernel.org/stable/c/ffa9b2a79e3e959683efbad3f6db937eca9d38f5"},{"url":"https://git.kernel.org/stable/c/0c87db77423a282b3b38b8a6daf057b822680516"}],"title":"mmc: rtsx_pci: fix return value check of mmc_add_host()","x_generator":{"engine":"bippy-1.2.0"}}}}