-

CVE-2022-50411

In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Fix error code path in acpi_ds_call_control_method()

A use-after-free in acpi_ps_parse_aml() after a failing invocaion of
acpi_ds_call_control_method() is reported by KASAN [1] and code
inspection reveals that next_walk_state pushed to the thread by
acpi_ds_create_walk_state() is freed on errors, but it is not popped
from the thread beforehand.  Thus acpi_ds_get_current_walk_state()
called by acpi_ps_parse_aml() subsequently returns it as the new
walk state which is incorrect.

To address this, make acpi_ds_call_control_method() call
acpi_ds_pop_walk_state() to pop next_walk_state from the thread before
returning an error.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 38e251d356a01b61a86cb35213cafd7e8fe7090c
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f520d181477ec29a496c0b3bbfbdb7e2606c2713
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2deb42c4f9776e59bee247c14af9c5e8c05ca9a6
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 9ef353c92f9d04c88de3af1a46859c1fb76db0f8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b0b83d3f3ffa96e8395c56b83d6197e184902a34
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 5777432ebaaf797e24f059979b42df3139967163
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0462fec709d51762ba486245bc344f44cc6cfa97
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 799881db3e03b5e98fe6a900d9d7de8c7d61e7ee
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 404ec60438add1afadaffaed34bb5fe4ddcadd40
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.127
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string