CVE-2022-50303
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.19 (inc) to 6.0.19 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-415 | The product calls free() twice on the same memory address. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's drm/amdkfd component involves a double release of a compute PASID (Process Address Space ID). When the function kfd_process_device_init_vm fails after converting a VM to a compute VM and setting its PASID, the kernel does not properly take a reference to the drm_file. This can cause the drm close file handler to release the same PASID twice, leading to a warning backtrace and a NULL pointer dereference in the kernel, which can cause instability or crashes.
How can this vulnerability impact me? :
This vulnerability can cause kernel instability or crashes due to a NULL pointer dereference triggered by the double release of the same PASID. This can lead to system crashes or denial of service conditions on affected Linux systems using the amdkfd driver.