CVE-2022-50482
EUVD-2025-3237904.10.2025, 16:15
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Clean up si_domain in the init_dmars() error path
A splat from kmem_cache_destroy() was seen with a kernel prior to
commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool")
when there was a failure in init_dmars(), because the iommu_domain
cache still had objects. While the mempool code is now gone, there
still is a leak of the si_domain memory if init_dmars() fails. So
clean up si_domain in the init_dmars() error path.EnginsightAffected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.2 ≤ 𝑥 < 4.14.298 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.264 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.221 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.152 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.76 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.0.6 |
| linux | linux_kernel | 6.1:rc1 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References