-
CVE-2022-50275
- EPSS 0.03%
- Published 15.09.2025 14:21:11
- Last modified 15.09.2025 15:22:27
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Add the missed acpi_put_table() to fix memory leak When the radeon driver reads the bios information from ACPI table in radeon_acpi_vfct_bios(), it misses to call acpi_put_table() to release the ACPI memory after the init, so add acpi_put_table() properly to fix the memory leak. v2: fix text formatting (Alex)
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
4539e3211a9bd2418e76797718a4e60a7ae34fcf
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version <
4760fa67aff6bd8ef0b14c1fa04c295e734c7309
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version <
a0f26560be2c566b62331cb0eeffa52929aa4d44
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version <
b4b30f56ec512e2c35fc0761bc90b0e519d8fa6e
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version <
6d25bc63708145c10f9c099d5c005602a7f2ef5f
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version <
50113de0f1e913c0b733e21d3e61fe9c0f2e9d50
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version <
9e203e437310f61fdf3c1107f41f85864cf4f6b1
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version <
10276a20be1115e1f76c189330da2992df980eee
Version
268ba0a99f89a84dc5eb312470896113d0709c74
Status
affected
Version
aca20e420100cda3d32d68e640d84cc02d8b45ef
Status
affected
Version
25413e693f697f801e1cc8fd10e90a7821a3a04b
Status
affected
Version
01edc881f64ff092978f333a5328e18a988f180b
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.6
Status
affected
Version <
3.6
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|