Metrics
Affected Vendors & Products
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 27 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-416 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 27 Feb 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3-sva: Fix mm use-after-free We currently call arm64_mm_context_put() without holding a reference to the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to ensure the mm only gets freed after we unpinned the ASID. | |
Title | iommu/arm-smmu-v3-sva: Fix mm use-after-free | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T02:12:47.206Z
Updated: 2025-02-27T18:22:32.946Z
Reserved: 2025-02-26T02:08:31.569Z
Link: CVE-2022-49426

Updated: 2025-02-27T18:16:12.353Z

Status : Received
Published: 2025-02-26T07:01:19.073
Modified: 2025-02-27T19:15:44.333
Link: CVE-2022-49426
