CVE-2022-50640
Description
In the Linux kernel, the following vulnerability has been resolved:
mmc: core: Fix kernel panic when remove non-standard SDIO card
SDIO tuple is only allocated for standard SDIO card, especially it causes memory corruption issues when the non-standard SDIO card has removed, which is because the card device's reference counter does not increase for it at sdio_init_func(), but all SDIO card device reference counter gets decreased at sdio_release_func().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel MMC/core bug causes kernel panic (use-after-free) when removing a non-standard SDIO card due to unbalanced reference counts.
Vulnerability
CVE-2022-50640 is a vulnerability in the Linux kernel's MMC core subsystem. When a non-standard SDIO card is removed, a kernel panic can occur. The root cause is that SDIO tuples are only allocated for standard SDIO cards. For non-standard cards, the card device's reference counter is not incremented in sdio_init_func(), but the counter is always decremented in sdio_release_func() during removal. This imbalance leads to a use-after-free or memory corruption, triggering a kernel panic [1][2].
Exploitation
An attacker with physical access to the system could trigger this bug by inserting and then removing a specially crafted non-standard SDIO card. No authentication is needed, but the attacker must be able to physically interact with the SDIO slot. The attack surface is limited to systems that allow hot-plugging of SDIO cards, such as embedded devices, laptops, or single-board computers.
Impact
Successful exploitation causes a kernel panic, leading to a denial of service (DoS) as the system crashes or becomes unstable. The reference count mismatch can also corrupt kernel memory, potentially allowing for further exploitation, though the primary impact is system availability.
Mitigation
The fix, which corrects the reference counting for non-standard cards, has been backported to multiple stable kernel versions (e.g., 5.10, 5.15, 5.4, 4.19) and is available in kernel commits [3][4]. Users should update their kernel to incorporate the patch. No workaround is available other than preventing hotplug of non-standard SDIO cards.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8b8b2965932e7b3275dde570b1fb79478695d7a09c64b7da08bf037279b581e8cd93ae53666d461a92f329972e6b40488Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/1e8cd93ae536581562bab4e1d8c5315bbc2548bfnvd
- git.kernel.org/stable/c/1fb79478695d92bab1c120ad3dad05252b02a29dnvd
- git.kernel.org/stable/c/66d461a92f32b6995b630625d350259b6b1f961bnvd
- git.kernel.org/stable/c/7a09c64b7da0abdec3919812e3d93ecc44069ed0nvd
- git.kernel.org/stable/c/8bf037279b5869ae9331c42bb1527d2680ebba96nvd
- git.kernel.org/stable/c/9972e6b404884adae9eec7463e30d9b3c9a70b18nvd
- git.kernel.org/stable/c/b3275dde570b6420106a715bb58a0af041b94d95nvd
- git.kernel.org/stable/c/b8b2965932e702b21e335ff30e1bb550f5a23b6fnvd
News mentions
0No linked articles in our index yet.