CVE-2022-50844
Type Mismatch in Linux amdgpu Driver Causes Kernel Panic
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a type mismatch in the Linux kernel's AMD GPU driver code, specifically in the function pointer type used in the odn_edit_dpm_table() callback. The second parameter's type was inconsistent between different implementations, causing issues with Clang's kernel control flow integrity (kCFI) feature. This mismatch could lead to runtime failures such as kernel panics or thread termination due to invalid indirect function calls. The fix involved updating the parameter type to be consistent across all relevant function prototypes to prevent these errors.
How can this vulnerability impact me? :
This vulnerability can cause runtime failures in the Linux kernel when using Clang's kernel control flow integrity feature. Specifically, it may lead to kernel panics or threads being killed due to invalid function pointer calls caused by the type mismatch. This can result in system instability or crashes when the affected AMD GPU driver code is executed.