
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a reference counting issue was identified in the ARM SMMU (System Memory Management Unit) device driver. The vulnerability, tracked as CVE-2022-47325, affects the arm_smmu_iova_to_phys_hard() function where several exception handling paths fail to properly decrease the refcount of 'smmu' that was previously increased by arm_smmu_rpm_get(). This oversight results in a refcount leak (Linux Kernel).
The technical issue occurs in the exception handling paths of arm_smmu_iova_to_phys_hard() function. When error scenarios are encountered, the function fails to properly decrease the reference count of the 'smmu' object that was previously incremented by arm_smmu_rpm_get(). The correct behavior should be to jump to the 'out' label when these error conditions occur to ensure proper reference count management (Rapid7).
The vulnerability results in a reference count leak in the ARM SMMU device driver. This can lead to resource management issues and potential system instability over time as reference counts become incorrectly tracked (Rapid7).
The issue has been patched in various Linux distributions. The fix involves modifying the error handling paths to properly jump to the 'out' label when error conditions occur, ensuring proper reference count management. Multiple packages including kernel, kernel-debuginfo, kernel-devel, and kernel-headers have been updated to address this vulnerability (Rapid7).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."