-

CVE-2022-50521

In the Linux kernel, the following vulnerability has been resolved:

platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]()

The ACPI buffer memory (out.pointer) returned by wmi_evaluate_method()
is not freed after the call, so it leads to memory leak.

The method results in ACPI buffer is not used, so just pass NULL to
wmi_evaluate_method() which fixes the memory leak.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 50ac517d6f5348b276f1f663799cf85dce521518
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
Version < 5b0f81b0808235967868e01336c976e840217108
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
Version < 14bb4bde3b7b2584734b13747b345caeeb41bea3
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
Version < 17cd8c46cbec4e6ad593fb9159928b8e7608c11a
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
Version < 3cf81501356c9e898ad94b2369ffc805f83f7d7b
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
Version < 379e7794c5e7485193d25d73614fbbd1e1387f6f
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
Version < 87426ce3bd57ad414b6e2436434ef8128986a9a5
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
Version < 727cc0147f5066e359aca65cc6cc5e6d64cc15d8
Version 99b38b4acc0d7dbbab443273577cff60080fcfad
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.0
Status affected
Version < 3.0
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String