In the Linux kernel, the following vulnerability has been resolved:
iommu/arm-smmu-v3: Don’t unregister on shutdown
Similar to SMMUv2, this driver calls iommu_device_unregister() from the
shutdown path, which removes the IOMMU groups with no coordination
whatsoever with their users - shutdown methods are optional in device
drivers. This can lead to NULL pointer dereferences in those drivers’
DMA API calls, or worse.
Instead of calling the full arm_smmu_device_remove() from
arm_smmu_device_shutdown(), let’s pick only the relevant function call -
arm_smmu_device_disable() - more or less the reverse of
arm_smmu_device_reset() - and call just that from the shutdown path.
git.kernel.org/linus/32ea2c57dc216b6ad8125fa680d31daa5d421c95 (6.2-rc4)
git.kernel.org/stable/c/32ea2c57dc216b6ad8125fa680d31daa5d421c95
git.kernel.org/stable/c/ead3e6c79479890444c777fd329afc125fecde48
launchpad.net/bugs/cve/CVE-2022-48894
nvd.nist.gov/vuln/detail/CVE-2022-48894
security-tracker.debian.org/tracker/CVE-2022-48894
www.cve.org/CVERecord?id=CVE-2022-48894