CVE-2022-50562

Source
https://cve.org/CVERecord?id=CVE-2022-50562
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50562.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50562
Downstream
Related
Published
2025-10-22T13:23:21.421Z
Modified
2026-03-20T11:47:31.499962Z
Summary
tpm: acpi: Call acpi_put_table() to fix memory leak
Details

In the Linux kernel, the following vulnerability has been resolved:

tpm: acpi: Call acpiputtable() to fix memory leak

The start and length of the event log area are obtained from TPM2 or TCPA table, so we call acpigettable() to get the ACPI information, but the acpigettable() should be coupled with acpiputtable() to release the ACPI memory, add the acpiputtable() properly to fix the memory leak.

While we are at it, remove the redundant empty line at the end of the tpmreadlog_acpi().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50562.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0bfb23746052168620c5b52f49d8a47c3bb022fa
Fixed
8ddc48068ac85740d3d5f9f3b0b323e733a35b33
Fixed
638cd298dfebce46919cbd6cf1884701215f506d
Fixed
694a3d66f493afd77c704c6de91d9be4d6e004e4
Fixed
bf31e3f8077af539feaf4e9bbf82e8eb51e7e5a8
Fixed
8740a12ca2e2959531ad253bac99ada338b33d80

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50562.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.18.0
Fixed
5.10.163
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.87
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.17
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50562.json"