In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Clean up si_domain in the init_dmars() error path
A splat from kmem_cache_destroy() was seen with a kernel prior to
commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool")
when there was a failure in init_dmars(), because the iommu_domain
cache still had objects. While the mempool code is now gone, there
still is a leak of the si_domain memory if init_dmars() fails. So
clean up si_domain in the init_dmars() error path.
Metrics
Affected Vendors & Products
References
History
Sat, 04 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Clean up si_domain in the init_dmars() error path A splat from kmem_cache_destroy() was seen with a kernel prior to commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool") when there was a failure in init_dmars(), because the iommu_domain cache still had objects. While the mempool code is now gone, there still is a leak of the si_domain memory if init_dmars() fails. So clean up si_domain in the init_dmars() error path. | |
Title | iommu/vt-d: Clean up si_domain in the init_dmars() error path | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-04T15:16:41.033Z
Reserved: 2025-10-04T15:13:33.468Z
Link: CVE-2022-50482

No data.

Status : Received
Published: 2025-10-04T16:15:44.967
Modified: 2025-10-04T16:15:44.967
Link: CVE-2022-50482

No data.

No data.