Home

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix kfd_process_device_init_vm error handling Should only destroy the ib_mem and let process cleanup worker to free the outstanding BOs. Reset the pointer in pdd->qpd structure, to avoid NULL pointer access in process destroy worker. BUG: kernel NULL pointer dereference, address: 0000000000000010 Call Trace: amdgpu_amdkfd_gpuvm_unmap_gtt_bo_from_kernel+0x46/0xb0 [amdgpu] kfd_process_device_destroy_cwsr_dgpu+0x40/0x70 [amdgpu] kfd_process_destroy_pdds+0x71/0x190 [amdgpu] kfd_process_wq_release+0x2a2/0x3b0 [amdgpu] process_one_work+0x2a1/0x600 worker_thread+0x39/0x3d0

PUBLISHED Reserved 2025-09-17 | Published 2025-09-17 | Updated 2025-10-29 | Assigner Linux

Product status

Default status
unaffected

68df0f195a689bbb0f92bfeadee6edd90c79c31f (git) before b6e78bd3bf2eb964c95eb2596d3cd367307a20b5
affected

68df0f195a689bbb0f92bfeadee6edd90c79c31f (git) before 9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9
affected

68df0f195a689bbb0f92bfeadee6edd90c79c31f (git) before 29d48b87db64b6697ddad007548e51d032081c59
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

6.0.19 (semver)
unaffected

6.1.5 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/b6e78bd3bf2eb964c95eb2596d3cd367307a20b5

git.kernel.org/...c/9d74d1f52e16d8e07f7fbe52e96d6391418a2fe9

git.kernel.org/...c/29d48b87db64b6697ddad007548e51d032081c59

cve.org (CVE-2022-50354)

nvd.nist.gov (CVE-2022-50354)

Download JSON