CVE-2022-50433

In the Linux kernel, the following vulnerability has been resolved: efi: ssdt: Don't free memory if ACPI table was loaded successfully Amadeusz reports KASAN use-after-free errors introduced by commit 3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from variables"). The problem appears to be that the memory that holds the new ACPI table is now freed unconditionally, instead of only when the ACPI core reported a failure to load the table. So let's fix this, by omitting the kfree() on success.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*

History

No history.

Information

Published : 2025-10-01 12:15

Updated : 2026-01-20 15:33


NVD link : CVE-2022-50433

Mitre link : CVE-2022-50433

CVE.ORG link : CVE-2022-50433


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free