In the Linux kernel, the following vulnerability has been resolved:
efi: ssdt: Don't free memory if ACPI table was loaded successfully
Amadeusz reports KASAN use-after-free errors introduced by commit
3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from
variables"). The problem appears to be that the memory that holds the
new ACPI table is now freed unconditionally, instead of only when the
ACPI core reported a failure to load the table.
So let's fix this, by omitting the kfree() on success.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-01 12:15
Updated : 2026-01-20 15:33
NVD link : CVE-2022-50433
Mitre link : CVE-2022-50433
CVE.ORG link : CVE-2022-50433
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
