First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to ensure the mm only gets freed after we unpinned the ASID.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.11<5.15.46 | |
Linux Kernel | >=5.16<5.17.14 | |
Linux Kernel | >=5.18<5.18.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49426 can lead to a use-after-free vulnerability in the Linux kernel, potentially causing system crashes or security breaches.
CVE-2022-49426 affects Linux Kernel versions from 5.11 to 5.15.46, from 5.16 to 5.17.14, and from 5.18 to 5.18.3.
To fix CVE-2022-49426, upgrade your Linux kernel to a version that includes the patch for this vulnerability.
CVE-2022-49426 is classified as a use-after-free vulnerability in the Linux kernel's IOMMU subsystem.
Yes, CVE-2022-49426 is considered a serious threat as it may allow an attacker to execute arbitrary code or crash the system.