{"id":"CVE-2022-50275","summary":"drm/radeon: Add the missed acpi_put_table() to fix memory leak","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: Add the missed acpi_put_table() to fix memory leak\n\nWhen the radeon driver reads the bios information from ACPI\ntable in radeon_acpi_vfct_bios(), it misses to call acpi_put_table()\nto release the ACPI memory after the init, so add acpi_put_table()\nproperly to fix the memory leak.\n\nv2: fix text formatting (Alex)","modified":"2026-04-02T08:28:22.640827Z","published":"2025-09-15T14:21:11.388Z","related":["SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50275.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/10276a20be1115e1f76c189330da2992df980eee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4539e3211a9bd2418e76797718a4e60a7ae34fcf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4760fa67aff6bd8ef0b14c1fa04c295e734c7309"},{"type":"WEB","url":"https://git.kernel.org/stable/c/50113de0f1e913c0b733e21d3e61fe9c0f2e9d50"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6d25bc63708145c10f9c099d5c005602a7f2ef5f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9e203e437310f61fdf3c1107f41f85864cf4f6b1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a0f26560be2c566b62331cb0eeffa52929aa4d44"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b4b30f56ec512e2c35fc0761bc90b0e519d8fa6e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50275.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50275"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"268ba0a99f89a84dc5eb312470896113d0709c74"},{"fixed":"4539e3211a9bd2418e76797718a4e60a7ae34fcf"},{"fixed":"4760fa67aff6bd8ef0b14c1fa04c295e734c7309"},{"fixed":"a0f26560be2c566b62331cb0eeffa52929aa4d44"},{"fixed":"b4b30f56ec512e2c35fc0761bc90b0e519d8fa6e"},{"fixed":"6d25bc63708145c10f9c099d5c005602a7f2ef5f"},{"fixed":"50113de0f1e913c0b733e21d3e61fe9c0f2e9d50"},{"fixed":"9e203e437310f61fdf3c1107f41f85864cf4f6b1"},{"fixed":"10276a20be1115e1f76c189330da2992df980eee"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"aca20e420100cda3d32d68e640d84cc02d8b45ef"},{"last_affected":"25413e693f697f801e1cc8fd10e90a7821a3a04b"},{"last_affected":"01edc881f64ff092978f333a5328e18a988f180b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50275.json"}}],"schema_version":"1.7.5"}