-

CVE-2022-50482

In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Clean up si_domain in the init_dmars() error path

A splat from kmem_cache_destroy() was seen with a kernel prior to
commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool")
when there was a failure in init_dmars(), because the iommu_domain
cache still had objects. While the mempool code is now gone, there
still is a leak of the si_domain memory if init_dmars() fails. So
clean up si_domain in the init_dmars() error path.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 749bea542b67513e99240dc58bbfc099e842d508
Version 86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status affected
Version < 5cecfe151874b835331efe086bbdcaeaf64f6b90
Version 86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status affected
Version < 724483b585a1b1e063d42ac5aa835707ff2ec165
Version 86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status affected
Version < d74196bb278b8f8af88e16bd595997dfa3d6fdb0
Version 86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status affected
Version < 0365d6af75f9f2696e94a0fef24a2c8464c037c8
Version 86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status affected
Version < c4ad3ae4c6be9d8b0701761c839771116bca6ea3
Version 86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status affected
Version < 620bf9f981365c18cc2766c53d92bf8131c63f32
Version 86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.2
Status affected
Version < 4.2
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.298
Status unaffected
Version <= 4.19.*
Version 4.19.264
Status unaffected
Version <= 5.4.*
Version 5.4.221
Status unaffected
Version <= 5.10.*
Version 5.10.152
Status unaffected
Version <= 5.15.*
Version 5.15.76
Status unaffected
Version <= 6.0.*
Version 6.0.6
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.053
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string