CVE-2022-49426

In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to ensure the mm only gets freed after we unpinned the ASID.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Mar 2025, 19:58

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu/arm-smmu-v3-sva: Se solucionó el problema de use-after-free de mm. Actualmente, llamamos a arm64_mm_context_put() sin mantener una referencia a mm, lo que puede resultar en un problema de use-after-free. Llamamos a mmgrab()/mmdrop() para asegurarnos de que mm solo se libere después de que desanclemos el ASID.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c - () https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c - Patch
References () https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68 - () https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68 - Patch
References () https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0 - () https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0 - Patch
References () https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa - () https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa - Patch

27 Feb 2025, 19:15

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-24 19:58


NVD link : CVE-2022-49426

Mitre link : CVE-2022-49426

CVE.ORG link : CVE-2022-49426


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free