lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025091506-CVE-2022-50275-2ef2@gregkh>
Date: Mon, 15 Sep 2025 16:21:17 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50275: drm/radeon: Add the missed acpi_put_table() to fix memory leak

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Add the missed acpi_put_table() to fix memory leak

When the radeon driver reads the bios information from ACPI
table in radeon_acpi_vfct_bios(), it misses to call acpi_put_table()
to release the ACPI memory after the init, so add acpi_put_table()
properly to fix the memory leak.

v2: fix text formatting (Alex)

The Linux kernel CVE team has assigned CVE-2022-50275 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 4.14.303 with commit 4539e3211a9bd2418e76797718a4e60a7ae34fcf
	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 4.19.270 with commit 4760fa67aff6bd8ef0b14c1fa04c295e734c7309
	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 5.4.229 with commit a0f26560be2c566b62331cb0eeffa52929aa4d44
	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 5.10.163 with commit b4b30f56ec512e2c35fc0761bc90b0e519d8fa6e
	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 5.15.86 with commit 6d25bc63708145c10f9c099d5c005602a7f2ef5f
	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 6.0.16 with commit 50113de0f1e913c0b733e21d3e61fe9c0f2e9d50
	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 6.1.2 with commit 9e203e437310f61fdf3c1107f41f85864cf4f6b1
	Issue introduced in 3.6 with commit 268ba0a99f89a84dc5eb312470896113d0709c74 and fixed in 6.2 with commit 10276a20be1115e1f76c189330da2992df980eee
	Issue introduced in 3.2.29 with commit aca20e420100cda3d32d68e640d84cc02d8b45ef
	Issue introduced in 3.4.12 with commit 25413e693f697f801e1cc8fd10e90a7821a3a04b
	Issue introduced in 3.5.5 with commit 01edc881f64ff092978f333a5328e18a988f180b

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2022-50275
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/gpu/drm/radeon/radeon_bios.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/4539e3211a9bd2418e76797718a4e60a7ae34fcf
	https://git.kernel.org/stable/c/4760fa67aff6bd8ef0b14c1fa04c295e734c7309
	https://git.kernel.org/stable/c/a0f26560be2c566b62331cb0eeffa52929aa4d44
	https://git.kernel.org/stable/c/b4b30f56ec512e2c35fc0761bc90b0e519d8fa6e
	https://git.kernel.org/stable/c/6d25bc63708145c10f9c099d5c005602a7f2ef5f
	https://git.kernel.org/stable/c/50113de0f1e913c0b733e21d3e61fe9c0f2e9d50
	https://git.kernel.org/stable/c/9e203e437310f61fdf3c1107f41f85864cf4f6b1
	https://git.kernel.org/stable/c/10276a20be1115e1f76c189330da2992df980eee

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ