In the Linux kernel, the following vulnerability has been resolved:
iommu/arm-smmu-v3-sva: Fix mm use-after-free
We currently call arm64_mm_context_put() without holding a reference to
the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to
ensure the mm only gets freed after we unpinned the ASID.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    24 Mar 2025, 19:58
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| References | () https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c - Patch | |
| References | () https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68 - Patch | |
| References | () https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0 - Patch | |
| References | () https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time | 
        
        Linux linux Kernel
         Linux  | 
27 Feb 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-416 | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
26 Feb 2025, 07:01
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-26 07:01
Updated : 2025-03-24 19:58
NVD link : CVE-2022-49426
Mitre link : CVE-2022-49426
CVE.ORG link : CVE-2022-49426
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
