Description
In the Linux kernel, the following vulnerability has been resolved: efi: ssdt: Don't free memory if ACPI table was loaded successfully Amadeusz reports KASAN use-after-free errors introduced by commit 3881ee0b1edc ("efi: avoid efivars layer when loading SSDTs from variables"). The problem appears to be that the memory that holds the new ACPI table is now freed unconditionally, instead of only when the ACPI core reported a failure to load the table. So let's fix this, by omitting the kfree() on success.
Product status
3881ee0b1edce0ece72d24b7c74f46b73bd6dcba before 11497fd69cd2282538ec6eb4cda1d16fc061233d
3881ee0b1edce0ece72d24b7c74f46b73bd6dcba before 4b017e59f01097f19b938f6dc4dc2c4720701610
6.0
Any version before 6.0
6.0.4
6.1
References
git.kernel.org/...c/11497fd69cd2282538ec6eb4cda1d16fc061233d
git.kernel.org/...c/4b017e59f01097f19b938f6dc4dc2c4720701610