In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: Clean up si_domain in the init_dmars() error path
A splat from kmem_cache_destroy() was seen with a kernel prior to commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool") when there was a failure in init_dmars(), because the iommu_domain cache still had objects. While the mempool code is now gone, there still is a leak of the si_domain memory if init_dmars() fails. So clean up si_domain in the init_dmars() error path.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 4.2 | 4.14.298 |
| linux / linux_kernel | 4.15 | 4.19.264 |
| linux / linux_kernel | 4.20 | 5.4.221 |
| linux / linux_kernel | 5.5 | 5.10.152 |
| linux / linux_kernel | 5.11 | 5.15.76 |
| linux / linux_kernel | 5.16 | 6.0.6 |
| linux / linux_kernel | 6.1-rc1 | 6.1-rc1.x |