
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in the Linux kernel's ACPICA subsystem, specifically in the acpi_ut_copy_ipackage_to_ipackage() function. The vulnerability was identified in Linux kernel version 6.1.0-rc7 and has been assigned CVE-2022-50423 (NVD).
The vulnerability occurs when acpi_ut_walk_package_tree() fails in acpi_ut_copy_ipackage_to_ipackage(), leading to a use-after-free condition of the acpi_operand_object. This issue was introduced by commit '8aa5e56eeb61' which attempted to fix a memory leak in acpi_ut_copy_iobject_to_iobject() but inadvertently added a repeated release operation. The vulnerability was detected by KASAN (Kernel Address Sanitizer) which reported a use-after-free in acpi_ut_remove_reference+0x3b/0x82 with a read of size 1 at address ffff888112afc460 (NVD).
When exploited, this vulnerability could lead to memory corruption in the Linux kernel, potentially resulting in system crashes or other undefined behavior. The issue affects the ACPI (Advanced Configuration and Power Interface) subsystem, which is critical for power management and hardware configuration (NVD).
The fix involves removing the acpi_ut_remove_reference() call in acpi_ut_copy_ipackage_to_ipackage(), as the memory of acpi_operand_object should be freed by the caller when the function fails. This ensures proper memory management and prevents the use-after-free condition (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."