-
CVE-2022-50521
- EPSS -
- Veröffentlicht 07.10.2025 15:19:15
- Zuletzt bearbeitet 07.10.2025 16:15:35
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() The ACPI buffer memory (out.pointer) returned by wmi_evaluate_method() is not freed after the call, so it leads to memory leak. The method results in ACPI buffer is not used, so just pass NULL to wmi_evaluate_method() which fixes the memory leak.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
50ac517d6f5348b276f1f663799cf85dce521518
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
5b0f81b0808235967868e01336c976e840217108
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
14bb4bde3b7b2584734b13747b345caeeb41bea3
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
17cd8c46cbec4e6ad593fb9159928b8e7608c11a
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
3cf81501356c9e898ad94b2369ffc805f83f7d7b
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
379e7794c5e7485193d25d73614fbbd1e1387f6f
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
87426ce3bd57ad414b6e2436434ef8128986a9a5
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
Version <
727cc0147f5066e359aca65cc6cc5e6d64cc15d8
Version
99b38b4acc0d7dbbab443273577cff60080fcfad
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.0
Status
affected
Version <
3.0
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.86
Status
unaffected
Version <=
6.0.*
Version
6.0.16
Status
unaffected
Version <=
6.1.*
Version
6.1.2
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|