-

CVE-2022-50275

In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Add the missed acpi_put_table() to fix memory leak

When the radeon driver reads the bios information from ACPI
table in radeon_acpi_vfct_bios(), it misses to call acpi_put_table()
to release the ACPI memory after the init, so add acpi_put_table()
properly to fix the memory leak.

v2: fix text formatting (Alex)

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 4539e3211a9bd2418e76797718a4e60a7ae34fcf
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 4760fa67aff6bd8ef0b14c1fa04c295e734c7309
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < a0f26560be2c566b62331cb0eeffa52929aa4d44
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < b4b30f56ec512e2c35fc0761bc90b0e519d8fa6e
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 6d25bc63708145c10f9c099d5c005602a7f2ef5f
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 50113de0f1e913c0b733e21d3e61fe9c0f2e9d50
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 9e203e437310f61fdf3c1107f41f85864cf4f6b1
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version < 10276a20be1115e1f76c189330da2992df980eee
Version 268ba0a99f89a84dc5eb312470896113d0709c74
Status affected
Version aca20e420100cda3d32d68e640d84cc02d8b45ef
Status affected
Version 25413e693f697f801e1cc8fd10e90a7821a3a04b
Status affected
Version 01edc881f64ff092978f333a5328e18a988f180b
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.6
Status affected
Version < 3.6
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string