CVE-2022-50393Uncontrolled Resource Consumption in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: SDMA update use unlocked iterator SDMA update page table may be called from unlocked context, this generate below warning. Use unlocked iterator to handle this case. WARNING: CPU: 0 PID: 1475 at drivers/dma-buf/dma-resv.c:483 dma_resv_iter_next Call Trace: dma_resv_iter_first+0x43/0xa0 amdgpu_vm_sdma_update+0x69/0x2d0 [amdgpu] amdgpu_vm_ptes_update+0x29c/0x870 [amdgpu] amdgpu_vm_update_range+0x2f6/0x6c0 [amdgpu] s

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

NVDlinux/linux_kernel4.25.19.17+1
Debianlinux/linux_kernel< 6.0.3-1+2
CVEListV5linux/linuxd38ceaf99ed015f2a0b9af3499791bd3a3daae21b892c57a3a04c8de247ab9ee08a0a8cf53290e19+3
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q8mf-qxc7-f7h5: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: SDMA update use unlocked iterator SDMA update page table may be call2025-09-18
OSV
CVE-2022-50393: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: SDMA update use unlocked iterator SDMA update page table may be called2025-09-18

📋Vendor Advisories

3
Red Hat
kernel: drm/amdgpu: SDMA update use unlocked iterator2025-09-18
Microsoft
drm/amdgpu: SDMA update use unlocked iterator2025-09-09
Debian
CVE-2022-50393: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...2022
CVE-2022-50393 — Uncontrolled Resource Consumption | cvebase