-

CVE-2022-50275

In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Add the missed acpi_put_table() to fix memory leak

When the radeon driver reads the bios information from ACPI
table in radeon_acpi_vfct_bios(), it misses to call acpi_put_table()
to release the ACPI memory after the init, so add acpi_put_table()
properly to fix the memory leak.

v2: fix text formatting (Alex)

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 4539e3211a9bd2418e76797718a4e60a7ae34fcf
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 4760fa67aff6bd8ef0b14c1fa04c295e734c7309
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < a0f26560be2c566b62331cb0eeffa52929aa4d44
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < b4b30f56ec512e2c35fc0761bc90b0e519d8fa6e
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 6d25bc63708145c10f9c099d5c005602a7f2ef5f
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 50113de0f1e913c0b733e21d3e61fe9c0f2e9d50
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 9e203e437310f61fdf3c1107f41f85864cf4f6b1
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 10276a20be1115e1f76c189330da2992df980eee
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version aca20e420100cda3d32d68e640d84cc02d8b45ef
Status affected
Version 25413e693f697f801e1cc8fd10e90a7821a3a04b
Status affected
Version 01edc881f64ff092978f333a5328e18a988f180b
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.6
Status affected
Version < 3.6
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String