CVE-2022-50433

Source
https://cve.org/CVERecord?id=CVE-2022-50433
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50433.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50433
Downstream
Related
Published
2025-10-01T11:42:11.444Z
Modified
2026-03-20T11:47:27.704048Z
Summary
efi: ssdt: Don't free memory if ACPI table was loaded successfully
Details

In the Linux kernel, the following vulnerability has been resolved:

efi: ssdt: Don't free memory if ACPI table was loaded successfully

Amadeusz reports KASAN use-after-free errors introduced by commit 3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from variables"). The problem appears to be that the memory that holds the new ACPI table is now freed unconditionally, instead of only when the ACPI core reported a failure to load the table.

So let's fix this, by omitting the kfree() on success.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50433.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3881ee0b1edce0ece72d24b7c74f46b73bd6dcba
Fixed
11497fd69cd2282538ec6eb4cda1d16fc061233d
Fixed
4b017e59f01097f19b938f6dc4dc2c4720701610

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50433.json"