{"id":"CVE-2022-50482","summary":"iommu/vt-d: Clean up si_domain in the init_dmars() error path","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Clean up si_domain in the init_dmars() error path\n\nA splat from kmem_cache_destroy() was seen with a kernel prior to\ncommit ee2653bbe89d (\"iommu/vt-d: Remove domain and devinfo mempool\")\nwhen there was a failure in init_dmars(), because the iommu_domain\ncache still had objects. While the mempool code is now gone, there\nstill is a leak of the si_domain memory if init_dmars() fails. So\nclean up si_domain in the init_dmars() error path.","modified":"2026-04-11T12:44:57.209624Z","published":"2025-10-04T15:16:41.033Z","related":["SUSE-SU-2025:4111-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4320-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50482.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0365d6af75f9f2696e94a0fef24a2c8464c037c8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5cecfe151874b835331efe086bbdcaeaf64f6b90"},{"type":"WEB","url":"https://git.kernel.org/stable/c/620bf9f981365c18cc2766c53d92bf8131c63f32"},{"type":"WEB","url":"https://git.kernel.org/stable/c/724483b585a1b1e063d42ac5aa835707ff2ec165"},{"type":"WEB","url":"https://git.kernel.org/stable/c/749bea542b67513e99240dc58bbfc099e842d508"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c4ad3ae4c6be9d8b0701761c839771116bca6ea3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d74196bb278b8f8af88e16bd595997dfa3d6fdb0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50482.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50482"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"86080ccc223aabf8d0b85a504f4f06aa88e82fb3"},{"fixed":"749bea542b67513e99240dc58bbfc099e842d508"},{"fixed":"5cecfe151874b835331efe086bbdcaeaf64f6b90"},{"fixed":"724483b585a1b1e063d42ac5aa835707ff2ec165"},{"fixed":"d74196bb278b8f8af88e16bd595997dfa3d6fdb0"},{"fixed":"0365d6af75f9f2696e94a0fef24a2c8464c037c8"},{"fixed":"c4ad3ae4c6be9d8b0701761c839771116bca6ea3"},{"fixed":"620bf9f981365c18cc2766c53d92bf8131c63f32"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50482.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.2.0"},{"fixed":"4.14.298"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.264"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.221"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.152"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.76"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50482.json"}}],"schema_version":"1.7.5"}