-

CVE-2022-50389

In the Linux kernel, the following vulnerability has been resolved:

tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak

In crb_acpi_add(), we get the TPM2 table to retrieve information
like start method, and then assign them to the priv data, so the
TPM2 table is not used after the init, should be freed, call
acpi_put_table() to fix the memory leak.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 08fd965521d0e172d540cf945517810895fcb199
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
Version < 1af2232b13837ce0f3a082b9f43735b09aafc367
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
Version < 927860dfa161ae8392a264197257dbdc52b26b0f
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
Version < 0bd9b4be721c776f77adcaf34105dfca3007ddb9
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
Version < 986cd9a9b95423e35a2cbb8e9105aec0e0d7f337
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
Version < 2fcd3dc8b97a14f1672729c86b7041a1a89b052a
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
Version < b0785edaf649e5f04dc7f75533e810f4c00e4106
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
Version < 37e90c374dd11cf4919c51e847c6d6ced0abc555
Version 30fc8d138e9123f374a3c3867e7c7c5cd4004941
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.0
Status affected
Version < 4.0
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.87
Status unaffected
Version <= 6.0.*
Version 6.0.17
Status unaffected
Version <= 6.1.*
Version 6.1.3
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String