-
CVE-2022-50393
- EPSS 0.02%
- Veröffentlicht 18.09.2025 13:33:12
- Zuletzt bearbeitet 19.09.2025 16:00:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: SDMA update use unlocked iterator SDMA update page table may be called from unlocked context, this generate below warning. Use unlocked iterator to handle this case. WARNING: CPU: 0 PID: 1475 at drivers/dma-buf/dma-resv.c:483 dma_resv_iter_next Call Trace: dma_resv_iter_first+0x43/0xa0 amdgpu_vm_sdma_update+0x69/0x2d0 [amdgpu] amdgpu_vm_ptes_update+0x29c/0x870 [amdgpu] amdgpu_vm_update_range+0x2f6/0x6c0 [amdgpu] svm_range_unmap_from_gpus+0x115/0x300 [amdgpu] svm_range_cpu_invalidate_pagetables+0x510/0x5e0 [amdgpu] __mmu_notifier_invalidate_range_start+0x1d3/0x230 unmap_vmas+0x140/0x150 unmap_region+0xa8/0x110
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
b892c57a3a04c8de247ab9ee08a0a8cf53290e19
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
Version <
4ff3d517cebe8a29b9f3c302b5292bb1ce291e00
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
Version <
3913f0179ba366f7d7d160c506ce00de1602bbc4
Version
d38ceaf99ed015f2a0b9af3499791bd3a3daae21
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.2
Status
affected
Version <
4.2
Version
0
Status
unaffected
Version <=
5.19.*
Version
5.19.17
Status
unaffected
Version <=
6.0.*
Version
6.0.3
Status
unaffected
Version <=
*
Version
6.1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.042 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|