CVE-2022-49426

high

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to ensure the mm only gets freed after we unpinned the ASID.

References

https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa

https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0

https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68

https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c

Details

Source: Mitre, NVD

Published: 2025-02-26

Updated: 2025-02-27

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High