๐Ÿ” CVE Alert

CVE-2022-50411

HIGH 7.8

ACPICA: Fix error code path in acpi_ds_call_control_method()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ACPICA: Fix error code path in acpi_ds_call_control_method() A use-after-free in acpi_ps_parse_aml() after a failing invocaion of acpi_ds_call_control_method() is reported by KASAN [1] and code inspection reveals that next_walk_state pushed to the thread by acpi_ds_create_walk_state() is freed on errors, but it is not popped from the thread beforehand. Thus acpi_ds_get_current_walk_state() called by acpi_ps_parse_aml() subsequently returns it as the new walk state which is incorrect. To address this, make acpi_ds_call_control_method() call acpi_ds_pop_walk_state() to pop next_walk_state from the thread before returning an error.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 38e251d356a01b61a86cb35213cafd7e8fe7090c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f520d181477ec29a496c0b3bbfbdb7e2606c2713 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2deb42c4f9776e59bee247c14af9c5e8c05ca9a6 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9ef353c92f9d04c88de3af1a46859c1fb76db0f8 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b0b83d3f3ffa96e8395c56b83d6197e184902a34 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5777432ebaaf797e24f059979b42df3139967163 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 0462fec709d51762ba486245bc344f44cc6cfa97 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 799881db3e03b5e98fe6a900d9d7de8c7d61e7ee 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 404ec60438add1afadaffaed34bb5fe4ddcadd40
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/38e251d356a01b61a86cb35213cafd7e8fe7090c git.kernel.org: https://git.kernel.org/stable/c/f520d181477ec29a496c0b3bbfbdb7e2606c2713 git.kernel.org: https://git.kernel.org/stable/c/2deb42c4f9776e59bee247c14af9c5e8c05ca9a6 git.kernel.org: https://git.kernel.org/stable/c/9ef353c92f9d04c88de3af1a46859c1fb76db0f8 git.kernel.org: https://git.kernel.org/stable/c/b0b83d3f3ffa96e8395c56b83d6197e184902a34 git.kernel.org: https://git.kernel.org/stable/c/5777432ebaaf797e24f059979b42df3139967163 git.kernel.org: https://git.kernel.org/stable/c/0462fec709d51762ba486245bc344f44cc6cfa97 git.kernel.org: https://git.kernel.org/stable/c/799881db3e03b5e98fe6a900d9d7de8c7d61e7ee git.kernel.org: https://git.kernel.org/stable/c/404ec60438add1afadaffaed34bb5fe4ddcadd40