CVE-2022-50521Missing Release of Memory after Effective Lifetime in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateApr 19

Description

In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() The ACPI buffer memory (out.pointer) returned by wmi_evaluate_method() is not freed after the call, so it leads to memory leak. The method results in ACPI buffer is not used, so just pass NULL to wmi_evaluate_method() which fixes the memory leak.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel3.04.14.303+6
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux99b38b4acc0d7dbbab443273577cff60080fcfad50ac517d6f5348b276f1f663799cf85dce521518+8
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

3
VulDB
Linux Kernel up to 6.1.1 wmi_evaluate_method memory leak (Nessus ID 302405 / WID-SEC-2025-2229)2026-04-19
GHSA
GHSA-7v86-rcc3-mqc8: In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() The ACPI buffer m2025-10-07
OSV
CVE-2022-50521: In the Linux kernel, the following vulnerability has been resolved: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() The ACPI buffer mem2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]()2025-10-07
Debian
CVE-2022-50521: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...2022