-

CVE-2022-50562

In the Linux kernel, the following vulnerability has been resolved:

tpm: acpi: Call acpi_put_table() to fix memory leak

The start and length of the event log area are obtained from
TPM2 or TCPA table, so we call acpi_get_table() to get the
ACPI information, but the acpi_get_table() should be coupled with
acpi_put_table() to release the ACPI memory, add the acpi_put_table()
properly to fix the memory leak.

While we are at it, remove the redundant empty line at the
end of the tpm_read_log_acpi().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 8ddc48068ac85740d3d5f9f3b0b323e733a35b33
Version 0bfb23746052168620c5b52f49d8a47c3bb022fa
Status affected
Version < 638cd298dfebce46919cbd6cf1884701215f506d
Version 0bfb23746052168620c5b52f49d8a47c3bb022fa
Status affected
Version < 694a3d66f493afd77c704c6de91d9be4d6e004e4
Version 0bfb23746052168620c5b52f49d8a47c3bb022fa
Status affected
Version < bf31e3f8077af539feaf4e9bbf82e8eb51e7e5a8
Version 0bfb23746052168620c5b52f49d8a47c3bb022fa
Status affected
Version < 8740a12ca2e2959531ad253bac99ada338b33d80
Version 0bfb23746052168620c5b52f49d8a47c3bb022fa
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.18
Status affected
Version < 4.18
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.87
Status unaffected
Version <= 6.0.*
Version 6.0.17
Status unaffected
Version <= 6.1.*
Version 6.1.3
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.061
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String