DEBIAN-CVE-2022-50354

Source
https://security-tracker.debian.org/tracker/CVE-2022-50354
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50354.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-50354
Upstream
Published
2025-09-17T15:15:34.037Z
Modified
2025-11-14T04:01:20.569966Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix kfdprocessdeviceinitvm error handling Should only destroy the ibmem and let process cleanup worker to free the outstanding BOs. Reset the pointer in pdd->qpd structure, to avoid NULL pointer access in process destroy worker. BUG: kernel NULL pointer dereference, address: 0000000000000010 Call Trace: amdgpuamdkfdgpuvmunmapgttbofromkernel+0x46/0xb0 [amdgpu] kfdprocessdevicedestroycwsrdgpu+0x40/0x70 [amdgpu] kfdprocessdestroypdds+0x71/0x190 [amdgpu] kfdprocesswqrelease+0x2a2/0x3b0 [amdgpu] processonework+0x2a1/0x600 workerthread+0x39/0x3d0

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}