Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to ensure the mm only gets freed after we unpinned the ASID.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.11, < 5.15.46 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506cPatch
- https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68Patch
- https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0Patch
- https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2faPatch
FAQ
What is CVE-2022-49426?
CVE-2022-49426 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which...
How severe is CVE-2022-49426?
CVE-2022-49426 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49426?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.