CVE-2022-50824
Description
In the Linux kernel, the following vulnerability has been resolved:
tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak
In check_acpi_tpm2(), we get the TPM2 table just to make sure the table is there, not used after the init, so the acpi_put_table() should be added to release the ACPI memory.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing acpi_put_table() call in the Linux kernel's TPM TIS driver causes a memory leak during ACPI table initialization.
Vulnerability
In the Linux kernel's TPM TIS driver of the Linux kernel, the function check_acpi_tpm2() retrieves the TPM2 ACPI table to verify its existence during initialization but fails to release the table after use. The missing acpi_put_table() call results in a memory leak, as the ACPI table mappings are not freed [1][1] properly freed.
Exploitation
This is a memory leak vulnerability that occurs during system boot when the TPM TIS driver initializes. No special privileges or network access are required; the leak happens automatically on systems with a TPM2 device and an ACPI table. The attack surface is limited to local exploitation that could lead to resource exhaustion over time.
Impact
An attacker with local access could exploit this leak to gradually deplete system memory, potentially causing denial of service (DoS) by exhausting available memory resources. The vulnerability does not allow code execution or privilege escalation.
Mitigation
The fix adds the missing acpi_put_table() call to release the ACPI table mapping after initialization. Patches have been applied to the Linux kernel stable branches [2][3]. Users should update to a kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
88bc6c10d3f38de667a2704aee027f3b9fabd3b6c822238da43135fb09812e0d1cf8ef84be60fa800a32adb9622f76210Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/3b6c822238da9ee8984803355601bcc603d49cb5nvd
- git.kernel.org/stable/c/43135fb098126ef2cd6ed584900fd7bfa25f95cenvd
- git.kernel.org/stable/c/8bc6c10d3f389693410adb14b4e9deec01ff6334nvd
- git.kernel.org/stable/c/db9622f762104459ff87ecdf885cc42c18053fd9nvd
- git.kernel.org/stable/c/de667a2704ae799f697fd45cf4317623d8c79fb7nvd
- git.kernel.org/stable/c/e027f3b9fabd2b410a4e6a7651e7a45b87019f23nvd
- git.kernel.org/stable/c/e0d1cf8ef84bb14a673215699fb8acc187aa2c4anvd
- git.kernel.org/stable/c/e60fa800a32a693d672b1a091424d780278c4587nvd
News mentions
0No linked articles in our index yet.