-
CVE-2022-50354
- EPSS 0.02%
- Published 17.09.2025 14:56:07
- Last modified 18.09.2025 13:43:34
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix kfd_process_device_init_vm error handling Should only destroy the ib_mem and let process cleanup worker to free the outstanding BOs. Reset the pointer in pdd->qpd structure, to avoid NULL pointer access in process destroy worker. BUG: kernel NULL pointer dereference, address: 0000000000000010 Call Trace: amdgpu_amdkfd_gpuvm_unmap_gtt_bo_from_kernel+0x46/0xb0 [amdgpu] kfd_process_device_destroy_cwsr_dgpu+0x40/0x70 [amdgpu] kfd_process_destroy_pdds+0x71/0x190 [amdgpu] kfd_process_wq_release+0x2a2/0x3b0 [amdgpu] process_one_work+0x2a1/0x600 worker_thread+0x39/0x3d0
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
b6e78bd3bf2eb964c95eb2596d3cd367307a20b5
Version
4a488a7ad71401169cecee75dc94bcce642e2c53
Status
affected
Version <
9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9
Version
4a488a7ad71401169cecee75dc94bcce642e2c53
Status
affected
Version <
29d48b87db64b6697ddad007548e51d032081c59
Version
4a488a7ad71401169cecee75dc94bcce642e2c53
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.19
Status
affected
Version <
3.19
Version
0
Status
unaffected
Version <=
6.0.*
Version
6.0.19
Status
unaffected
Version <=
6.1.*
Version
6.1.5
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.043 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|