-
CVE-2022-50521
- EPSS -
- Published 07.10.2025 15:19:15
- Last modified 07.10.2025 16:15:35
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() The ACPI buffer memory (out.pointer) returned by wmi_evaluate_method() is not freed after the call, so it leads to memory leak. The method results in ACPI buffer is not used, so just pass NULL to wmi_evaluate_method() which fixes the memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
50ac517d6f5348b276f1f663799cf85dce521518
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
5b0f81b0808235967868e01336c976e840217108
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
14bb4bde3b7b2584734b13747b345caeeb41bea3
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
17cd8c46cbec4e6ad593fb9159928b8e7608c11a
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
3cf81501356c9e898ad94b2369ffc805f83f7d7b
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
379e7794c5e7485193d25d73614fbbd1e1387f6f
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
87426ce3bd57ad414b6e2436434ef8128986a9a5
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
727cc0147f5066e359aca65cc6cc5e6d64cc15d8
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.0
Status
affected
Version <
3.0
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|