VYPR
Unrated severityNVD Advisory· Published Oct 22, 2025· Updated Apr 15, 2026

CVE-2022-50562

CVE-2022-50562

Description

In the Linux kernel, the following vulnerability has been resolved:

tpm: acpi: Call acpi_put_table() to fix memory leak

The start and length of the event log area are obtained from TPM2 or TCPA table, so we call acpi_get_table() to get the ACPI information, but the acpi_get_table() should be coupled with acpi_put_table() to release the ACPI memory, add the acpi_put_table() properly to fix the memory leak.

While we are at it, remove the redundant empty line at the end of the tpm_read_log_acpi().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Memory leak in Linux kernel TPM ACPI code due to missing acpi_put_table() can lead to resource exhaustion.

Vulnerability

Description

In the Linux kernel, the TPM (Trusted Platform Module) ACPI subsystem retrieves the event log area using the TPM2 or TCPA ACPI tables. The function acpi_get_table() is called to obtain the table, but the corresponding acpi_put_table() was missing, resulting in a memory leak [1][2]. This flaw exists in the tpm_read_log_acpi() function, where the ACPI memory is not released after use.

Exploitation

The memory leak occurs locally when the system accesses the TPM event log via ACPI. An attacker with local access could repeatedly trigger the vulnerable code path, causing gradual memory depletion. No special privileges beyond local user access are required, as the TPM event log reading is accessible to unprivileged processes in certain configurations.

Impact

Over time, the memory leak leads to exhaustion of system memory, potentially causing denial of service (DoS) by starving other processes of memory resources. The kernel may become unstable or crash under prolonged exploitation.

Mitigation

The fix is included in Linux kernel stable updates that apply commit 638cd298dfeb [1] and commit 8740a12ca2e2 [2]. Users should update their kernel to the latest stable version to mitigate this vulnerability. No workaround is available other than applying the patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

5

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.