HomeDefault status
unaffected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 92c089a931fd3939cd32318cf4f54e69e8f51a19
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8745f3592ee4a7b49ede16ddd3f12a41ecaa23c9
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d0a917fd5e3b3ed9d9306b4260ba684b982da9f3
affected
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9afea57384d4ae7b2034593eac7fa76c7122762a
affected
Default status
affected
5.15.113 (semver)
unaffected
6.1.81 (semver)
unaffected
6.3.4 (semver)
unaffected
6.4 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: iommu/sprd: Release dma buffer to avoid memory leak When attaching to a domain, the driver would alloc a DMA buffer which is used to store address mapping table, and it need to be released when the IOMMU domain is freed.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 92c089a931fd3939cd32318cf4f54e69e8f51a19
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8745f3592ee4a7b49ede16ddd3f12a41ecaa23c9
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d0a917fd5e3b3ed9d9306b4260ba684b982da9f3
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9afea57384d4ae7b2034593eac7fa76c7122762a
5.15.113 (semver)
6.1.81 (semver)
6.3.4 (semver)
6.4 (original_commit_for_fix)
References
git.kernel.org/...c/92c089a931fd3939cd32318cf4f54e69e8f51a19
git.kernel.org/...c/8745f3592ee4a7b49ede16ddd3f12a41ecaa23c9
git.kernel.org/...c/d0a917fd5e3b3ed9d9306b4260ba684b982da9f3
git.kernel.org/...c/9afea57384d4ae7b2034593eac7fa76c7122762a