CVE-2022-50267

5.5 MEDIUM

📋 TL;DR

This CVE-2022-50267 is a Linux kernel memory leak vulnerability in the mmc/rtsx_pci driver where mmc_add_host() return value isn't properly checked. If mmc_add_host() fails, allocated memory isn't freed, leading to resource exhaustion and potential kernel crashes. This affects Linux systems using Realtek PCIe card reader hardware.

💻 Affected Systems

Products:
  • Linux kernel with rtsx_pci driver
Versions: Linux kernel versions before fixes in stable releases
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Realtek PCIe card reader hardware using the rtsx_pci driver.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic and system crash due to memory exhaustion, potentially causing denial of service and data loss.

🟠

Likely Case

System instability or crashes when mmc_add_host() fails during device initialization, requiring reboot.

🟢

If Mitigated

Minor performance impact or device initialization failure without system crash.

🌐 Internet-Facing: LOW - Requires local access or physical device interaction.
🏢 Internal Only: MEDIUM - Could affect servers with vulnerable hardware, but requires specific conditions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering mmc_add_host() failure, which may occur during device initialization or hardware issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel stable releases containing commits 0c87db77423a, 30dc645461df, 5cd4e04eccaec, or ffa9b2a79e3e

Vendor Advisory: https://git.kernel.org/stable/c/0c87db77423a282b3b38b8a6daf057b822680516

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version and driver functionality.

🔧 Temporary Workarounds

Disable rtsx_pci driver

all

Prevent loading of vulnerable driver module

echo 'blacklist rtsx_pci' >> /etc/modprobe.d/blacklist.conf
rmmod rtsx_pci

🧯 If You Can't Patch

  • Monitor system logs for mmc/rtsx_pci errors and kernel oops messages
  • Consider disabling PCIe card reader functionality if not required

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if rtsx_pci driver is loaded: lsmod | grep rtsx_pci

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and driver loads without errors in dmesg

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages
  • mmc_add_host failure logs
  • Out of memory errors in dmesg

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("mmc_add_host" OR "rtsx_pci" OR "kernel panic")

🔗 References

📤 Share & Export