CVE-2022-50482
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a memory leak in the Linux kernel's iommu/vt-d component. Specifically, if the init_dmars() function fails, the si_domain memory is not properly cleaned up, leading to a leak. This issue was present before a certain commit that removed the domain and devinfo mempool. The problem was that the iommu_domain cache still had objects during failure, causing a splat from kmem_cache_destroy(). The fix ensures that si_domain is cleaned up properly in the error path of init_dmars().
How can this vulnerability impact me? :
The vulnerability can cause a memory leak in the Linux kernel, which may lead to increased memory usage and potentially degrade system stability or performance over time if the init_dmars() function fails. However, no direct information about exploitation or broader impacts is provided.