In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Clean up si_domain in the init_dmars() error path
A splat from kmem_cache_destroy() was seen with a kernel prior to
commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool")
when there was a failure in init_dmars(), because the iommu_domain
cache still had objects. While the mempool code is now gone, there
still is a leak of the si_domain memory if init_dmars() fails. So
clean up si_domain in the init_dmars() error path.
References
Configurations
Configuration 1 (hide)
|
History
23 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/0365d6af75f9f2696e94a0fef24a2c8464c037c8 - Patch | |
| References | () https://git.kernel.org/stable/c/5cecfe151874b835331efe086bbdcaeaf64f6b90 - Patch | |
| References | () https://git.kernel.org/stable/c/620bf9f981365c18cc2766c53d92bf8131c63f32 - Patch | |
| References | () https://git.kernel.org/stable/c/724483b585a1b1e063d42ac5aa835707ff2ec165 - Patch | |
| References | () https://git.kernel.org/stable/c/749bea542b67513e99240dc58bbfc099e842d508 - Patch | |
| References | () https://git.kernel.org/stable/c/c4ad3ae4c6be9d8b0701761c839771116bca6ea3 - Patch | |
| References | () https://git.kernel.org/stable/c/d74196bb278b8f8af88e16bd595997dfa3d6fdb0 - Patch | |
| CWE | CWE-908 | |
| First Time |
Linux
Linux linux Kernel |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-01-23 20:15
NVD link : CVE-2022-50482
Mitre link : CVE-2022-50482
CVE.ORG link : CVE-2022-50482
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-908
Use of Uninitialized Resource
