[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025091854-CVE-2022-50411-45ab@gregkh>
Date: Thu, 18 Sep 2025 18:04:01 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50411: ACPICA: Fix error code path in acpi_ds_call_control_method()
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Fix error code path in acpi_ds_call_control_method()
A use-after-free in acpi_ps_parse_aml() after a failing invocaion of
acpi_ds_call_control_method() is reported by KASAN [1] and code
inspection reveals that next_walk_state pushed to the thread by
acpi_ds_create_walk_state() is freed on errors, but it is not popped
from the thread beforehand. Thus acpi_ds_get_current_walk_state()
called by acpi_ps_parse_aml() subsequently returns it as the new
walk state which is incorrect.
To address this, make acpi_ds_call_control_method() call
acpi_ds_pop_walk_state() to pop next_walk_state from the thread before
returning an error.
The Linux kernel CVE team has assigned CVE-2022-50411 to this issue.
Affected and fixed versions
===========================
Fixed in 4.9.337 with commit 38e251d356a01b61a86cb35213cafd7e8fe7090c
Fixed in 4.14.303 with commit f520d181477ec29a496c0b3bbfbdb7e2606c2713
Fixed in 4.19.270 with commit 2deb42c4f9776e59bee247c14af9c5e8c05ca9a6
Fixed in 5.4.229 with commit 9ef353c92f9d04c88de3af1a46859c1fb76db0f8
Fixed in 5.10.163 with commit b0b83d3f3ffa96e8395c56b83d6197e184902a34
Fixed in 5.15.86 with commit 5777432ebaaf797e24f059979b42df3139967163
Fixed in 6.0.16 with commit 0462fec709d51762ba486245bc344f44cc6cfa97
Fixed in 6.1.2 with commit 799881db3e03b5e98fe6a900d9d7de8c7d61e7ee
Fixed in 6.2 with commit 404ec60438add1afadaffaed34bb5fe4ddcadd40
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-50411
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/acpi/acpica/dsmethod.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/38e251d356a01b61a86cb35213cafd7e8fe7090c
https://git.kernel.org/stable/c/f520d181477ec29a496c0b3bbfbdb7e2606c2713
https://git.kernel.org/stable/c/2deb42c4f9776e59bee247c14af9c5e8c05ca9a6
https://git.kernel.org/stable/c/9ef353c92f9d04c88de3af1a46859c1fb76db0f8
https://git.kernel.org/stable/c/b0b83d3f3ffa96e8395c56b83d6197e184902a34
https://git.kernel.org/stable/c/5777432ebaaf797e24f059979b42df3139967163
https://git.kernel.org/stable/c/0462fec709d51762ba486245bc344f44cc6cfa97
https://git.kernel.org/stable/c/799881db3e03b5e98fe6a900d9d7de8c7d61e7ee
https://git.kernel.org/stable/c/404ec60438add1afadaffaed34bb5fe4ddcadd40
Powered by blists - more mailing lists