CVE-2022-50562
Description
In the Linux kernel, the following vulnerability has been resolved:
tpm: acpi: Call acpi_put_table() to fix memory leak
The start and length of the event log area are obtained from TPM2 or TCPA table, so we call acpi_get_table() to get the ACPI information, but the acpi_get_table() should be coupled with acpi_put_table() to release the ACPI memory, add the acpi_put_table() properly to fix the memory leak.
While we are at it, remove the redundant empty line at the end of the tpm_read_log_acpi().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Memory leak in Linux kernel TPM ACPI code due to missing acpi_put_table() can lead to resource exhaustion.
Vulnerability
Description
In the Linux kernel, the TPM (Trusted Platform Module) ACPI subsystem retrieves the event log area using the TPM2 or TCPA ACPI tables. The function acpi_get_table() is called to obtain the table, but the corresponding acpi_put_table() was missing, resulting in a memory leak [1][2]. This flaw exists in the tpm_read_log_acpi() function, where the ACPI memory is not released after use.
Exploitation
The memory leak occurs locally when the system accesses the TPM event log via ACPI. An attacker with local access could repeatedly trigger the vulnerable code path, causing gradual memory depletion. No special privileges beyond local user access are required, as the TPM event log reading is accessible to unprivileged processes in certain configurations.
Impact
Over time, the memory leak leads to exhaustion of system memory, potentially causing denial of service (DoS) by starving other processes of memory resources. The kernel may become unstable or crash under prolonged exploitation.
Mitigation
The fix is included in Linux kernel stable updates that apply commit 638cd298dfeb [1] and commit 8740a12ca2e2 [2]. Users should update their kernel to the latest stable version to mitigate this vulnerability. No workaround is available other than applying the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
58ddc48068ac8638cd298dfeb694a3d66f493bf31e3f8077a8740a12ca2e2Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/638cd298dfebce46919cbd6cf1884701215f506dnvd
- git.kernel.org/stable/c/694a3d66f493afd77c704c6de91d9be4d6e004e4nvd
- git.kernel.org/stable/c/8740a12ca2e2959531ad253bac99ada338b33d80nvd
- git.kernel.org/stable/c/8ddc48068ac85740d3d5f9f3b0b323e733a35b33nvd
- git.kernel.org/stable/c/bf31e3f8077af539feaf4e9bbf82e8eb51e7e5a8nvd
News mentions
0No linked articles in our index yet.