-
CVE-2022-50482
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:16:41
- Zuletzt bearbeitet 06.10.2025 14:56:47
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Clean up si_domain in the init_dmars() error path A splat from kmem_cache_destroy() was seen with a kernel prior to commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool") when there was a failure in init_dmars(), because the iommu_domain cache still had objects. While the mempool code is now gone, there still is a leak of the si_domain memory if init_dmars() fails. So clean up si_domain in the init_dmars() error path.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
749bea542b67513e99240dc58bbfc099e842d508
Version
86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status
affected
Version <
5cecfe151874b835331efe086bbdcaeaf64f6b90
Version
86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status
affected
Version <
724483b585a1b1e063d42ac5aa835707ff2ec165
Version
86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status
affected
Version <
d74196bb278b8f8af88e16bd595997dfa3d6fdb0
Version
86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status
affected
Version <
0365d6af75f9f2696e94a0fef24a2c8464c037c8
Version
86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status
affected
Version <
c4ad3ae4c6be9d8b0701761c839771116bca6ea3
Version
86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status
affected
Version <
620bf9f981365c18cc2766c53d92bf8131c63f32
Version
86080ccc223aabf8d0b85a504f4f06aa88e82fb3
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.2
Status
affected
Version <
4.2
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.298
Status
unaffected
Version <=
4.19.*
Version
4.19.264
Status
unaffected
Version <=
5.4.*
Version
5.4.221
Status
unaffected
Version <=
5.10.*
Version
5.10.152
Status
unaffected
Version <=
5.15.*
Version
5.15.76
Status
unaffected
Version <=
6.0.*
Version
6.0.6
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|