CVE-2022-50433
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
01/10/2025
Last modified:
20/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
efi: ssdt: Don&#39;t free memory if ACPI table was loaded successfully<br />
<br />
Amadeusz reports KASAN use-after-free errors introduced by commit<br />
3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from<br />
variables"). The problem appears to be that the memory that holds the<br />
new ACPI table is now freed unconditionally, instead of only when the<br />
ACPI core reported a failure to load the table.<br />
<br />
So let&#39;s fix this, by omitting the kfree() on success.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.0.4 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



