CVE-2022-50521

medium

Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() The ACPI buffer memory (out.pointer) returned by wmi_evaluate_method() is not freed after the call, so it leads to memory leak. The method results in ACPI buffer is not used, so just pass NULL to wmi_evaluate_method() which fixes the memory leak.

References

https://git.kernel.org/stable/c/87426ce3bd57ad414b6e2436434ef8128986a9a5

https://git.kernel.org/stable/c/727cc0147f5066e359aca65cc6cc5e6d64cc15d8

https://git.kernel.org/stable/c/5b0f81b0808235967868e01336c976e840217108

https://git.kernel.org/stable/c/50ac517d6f5348b276f1f663799cf85dce521518

https://git.kernel.org/stable/c/3cf81501356c9e898ad94b2369ffc805f83f7d7b

https://git.kernel.org/stable/c/379e7794c5e7485193d25d73614fbbd1e1387f6f

https://git.kernel.org/stable/c/17cd8c46cbec4e6ad593fb9159928b8e7608c11a

https://git.kernel.org/stable/c/14bb4bde3b7b2584734b13747b345caeeb41bea3

Details

Source: Mitre, NVD

Published: 2025-10-07

Updated: 2025-10-08

Risk Information

CVSS v2

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00024