๐Ÿ” CVE Alert

CVE-2022-50433

UNKNOWN 0.0

efi: ssdt: Don't free memory if ACPI table was loaded successfully

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: efi: ssdt: Don't free memory if ACPI table was loaded successfully Amadeusz reports KASAN use-after-free errors introduced by commit 3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from variables"). The problem appears to be that the memory that holds the new ACPI table is now freed unconditionally, instead of only when the ACPI core reported a failure to load the table. So let's fix this, by omitting the kfree() on success.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3881ee0b1edce0ece72d24b7c74f46b73bd6dcba < 11497fd69cd2282538ec6eb4cda1d16fc061233d 3881ee0b1edce0ece72d24b7c74f46b73bd6dcba < 4b017e59f01097f19b938f6dc4dc2c4720701610
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/11497fd69cd2282538ec6eb4cda1d16fc061233d git.kernel.org: https://git.kernel.org/stable/c/4b017e59f01097f19b938f6dc4dc2c4720701610