In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Clean up si_domain in the init_dmars() error path
A splat from kmem_cache_destroy() was seen with a kernel prior to
commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool")
when there was a failure in init_dmars(), because the iommu_domain
cache still had objects. While the mempool code is now gone, there
still is a leak of the si_domain memory if init_dmars() fails. So
clean up si_domain in the init_dmars() error path.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-04 16:15
Updated : 2026-01-23 20:15
NVD link : CVE-2022-50482
Mitre link : CVE-2022-50482
CVE.ORG link : CVE-2022-50482
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-908
Use of Uninitialized Resource
