-
CVE-2022-50389
- EPSS 0.03%
- Veröffentlicht 18.09.2025 13:33:09
- Zuletzt bearbeitet 19.09.2025 16:00:46
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak In crb_acpi_add(), we get the TPM2 table to retrieve information like start method, and then assign them to the priv data, so the TPM2 table is not used after the init, should be freed, call acpi_put_table() to fix the memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
08fd965521d0e172d540cf945517810895fcb199
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
Version <
1af2232b13837ce0f3a082b9f43735b09aafc367
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
Version <
927860dfa161ae8392a264197257dbdc52b26b0f
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
Version <
0bd9b4be721c776f77adcaf34105dfca3007ddb9
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
Version <
986cd9a9b95423e35a2cbb8e9105aec0e0d7f337
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
Version <
2fcd3dc8b97a14f1672729c86b7041a1a89b052a
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
Version <
b0785edaf649e5f04dc7f75533e810f4c00e4106
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
Version <
37e90c374dd11cf4919c51e847c6d6ced0abc555
Version
30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.0
Status
affected
Version <
4.0
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.17
Status
unaffected
Version <=
6.1.*
Version
6.1.3
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.078 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|