CVE-2022-49426
iommu/arm-smmu-v3-sva: Fix mm use-after-free
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to ensure the mm only gets freed after we unpinned the ASID.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 26, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
32784a9562fb0518b12e9797ee2aec52214adf6f < fc90f13ea0dcd960e5002d204fa55cec4e0db2fa 32784a9562fb0518b12e9797ee2aec52214adf6f < e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0 32784a9562fb0518b12e9797ee2aec52214adf6f < 9aa215450888cf29af0c479e14a712dc6b0c506c 32784a9562fb0518b12e9797ee2aec52214adf6f < cbd23144f7662b00bcde32a938c4a4057e476d68
Linux / Linux
5.11
References
git.kernel.org: https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa git.kernel.org: https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0 git.kernel.org: https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c git.kernel.org: https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68