CVE-2022-50433Use After Free in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 95.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: efi: ssdt: Don't free memory if ACPI table was loaded successfully Amadeusz reports KASAN use-after-free errors introduced by commit 3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from variables"). The problem appears to be that the memory that holds the new ACPI table is now freed unconditionally, instead of only when the ACPI core reported a failure to load the table. So let's fix this, by omitting the kfree() o

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.06.0.4+1
Debianlinux/linux_kernel< 6.0.5-1+2
CVEListV5linux/linux3881ee0b1edce0ece72d24b7c74f46b73bd6dcba11497fd69cd2282538ec6eb4cda1d16fc061233d+2
debiandebian/linux< linux 6.0.5-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-g2f3-v5g7-7j6h: In the Linux kernel, the following vulnerability has been resolved: efi: ssdt: Don't free memory if ACPI table was loaded successfully Amadeusz repo2025-10-01
OSV
CVE-2022-50433: In the Linux kernel, the following vulnerability has been resolved: efi: ssdt: Don't free memory if ACPI table was loaded successfully Amadeusz report2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: efi: ssdt: Don't free memory if ACPI table was loaded successfully2025-10-01
Debian
CVE-2022-50433: linux - In the Linux kernel, the following vulnerability has been resolved: efi: ssdt: ...2022