Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-48724

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-20 Jun, 2024 | 11:13
Updated At-04 May, 2025 | 12:43
Rejected At-
Credits

iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() After commit e3beca48a45b ("irqdomain/treewide: Keep firmware node unconditionally allocated"). For tear down scenario, fn is only freed after fail to allocate ir_domain, though it also should be freed in case dmar_enable_qi returns error. Besides free fn, irq_domain and ir_msi_domain need to be removed as well if intel_setup_irq_remapping fails to enable queued invalidation. Improve the rewinding path by add out_free_ir_domain and out_free_fwnode lables per Baolu's suggestion.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:20 Jun, 2024 | 11:13
Updated At:04 May, 2025 | 12:43
Rejected At:
▼CVE Numbering Authority (CNA)
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() After commit e3beca48a45b ("irqdomain/treewide: Keep firmware node unconditionally allocated"). For tear down scenario, fn is only freed after fail to allocate ir_domain, though it also should be freed in case dmar_enable_qi returns error. Besides free fn, irq_domain and ir_msi_domain need to be removed as well if intel_setup_irq_remapping fails to enable queued invalidation. Improve the rewinding path by add out_free_ir_domain and out_free_fwnode lables per Baolu's suggestion.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/iommu/intel/irq_remapping.c
Default Status
unaffected
Versions
Affected
  • From 03992c88d71ba79d956f2ed54e370e630b8750f4 before a0c685ba99961b1dd894b2e470e692a539770f6d (git)
  • From c0c489e5430530a7021f4c889cd5931597e4b200 before a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9 (git)
  • From 36f7355545725c5e9400520ae33e6ee16cf78c0e before 5c43d46daa0d2928234dd2792ebebc35d29ee2d1 (git)
  • From e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb before 9d9995b0371e4e8c18d4f955479e5d47efe7b2d4 (git)
  • From e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb before 336d096b62bdc673e852b6b80d5072d7888ce85d (git)
  • From e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb before b62eceb5f8f08815fe3f945fc55bbf997c344ecd (git)
  • From e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb before 99e675d473eb8cf2deac1376a0f840222fc1adcf (git)
  • b4198ecddb87cd955aa9e024dd656af5ceaf6196 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/iommu/intel/irq_remapping.c
Default Status
affected
Versions
Affected
  • 5.8
Unaffected
  • From 0 before 5.8 (semver)
  • From 4.14.265 through 4.14.* (semver)
  • From 4.19.228 through 4.19.* (semver)
  • From 5.4.178 through 5.4.* (semver)
  • From 5.10.99 through 5.10.* (semver)
  • From 5.15.22 through 5.15.* (semver)
  • From 5.16.8 through 5.16.* (semver)
  • From 5.17 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d
N/A
https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9
N/A
https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1
N/A
https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4
N/A
https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d
N/A
https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd
N/A
https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf
N/A
Hyperlink: https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d
x_transferred
https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9
x_transferred
https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1
x_transferred
https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4
x_transferred
https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d
x_transferred
https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd
x_transferred
https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf
x_transferred
Hyperlink: https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:20 Jun, 2024 | 12:15
Updated At:18 Sep, 2024 | 16:19

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() After commit e3beca48a45b ("irqdomain/treewide: Keep firmware node unconditionally allocated"). For tear down scenario, fn is only freed after fail to allocate ir_domain, though it also should be freed in case dmar_enable_qi returns error. Besides free fn, irq_domain and ir_msi_domain need to be removed as well if intel_setup_irq_remapping fails to enable queued invalidation. Improve the rewinding path by add out_free_ir_domain and out_free_fwnode lables per Baolu's suggestion.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.14.190(inclusive) to 4.14.265(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.19.135(inclusive) to 4.19.228(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.4.54(inclusive) to 5.4.178(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.7.11(inclusive) to 5.8(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.8(inclusive) to 5.10.99(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.22(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 5.16.8(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.17
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>5.17
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-401Primarynvd@nist.gov
CWE ID: CWE-401
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
Hyperlink: https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found