CVE-2022-50411

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
18/09/2025
Last modified:
14/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ACPICA: Fix error code path in acpi_ds_call_control_method()<br /> <br /> A use-after-free in acpi_ps_parse_aml() after a failing invocaion of<br /> acpi_ds_call_control_method() is reported by KASAN [1] and code<br /> inspection reveals that next_walk_state pushed to the thread by<br /> acpi_ds_create_walk_state() is freed on errors, but it is not popped<br /> from the thread beforehand. Thus acpi_ds_get_current_walk_state()<br /> called by acpi_ps_parse_aml() subsequently returns it as the new<br /> walk state which is incorrect.<br /> <br /> To address this, make acpi_ds_call_control_method() call<br /> acpi_ds_pop_walk_state() to pop next_walk_state from the thread before<br /> returning an error.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9.337 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.303 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.270 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.229 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.163 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.86 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.0.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1 (including) 6.1.2 (excluding)