CVE-2022-48990

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the AMD GPU driver within the Linux kernel. An attacker could potentially exploit this during GPU recovery operations to cause a kernel crash or possibly execute arbitrary code. This affects Linux systems with AMD GPUs using the amdgpu driver.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU driver (amdgpu)
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD GPUs using the amdgpu driver. Requires GPU operations to trigger.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash or potential arbitrary code execution with kernel privileges, resulting in complete system compromise.

🟠

Likely Case

System instability, kernel crashes, or denial of service during GPU-intensive operations or recovery scenarios.

🟢

If Mitigated

System remains stable with proper patching; unpatched systems may experience crashes during GPU operations.

🌐 Internet-Facing: LOW - This vulnerability requires local access or ability to trigger GPU operations, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - Local users or processes with GPU access could potentially trigger this vulnerability, leading to system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering GPU recovery operations, which may require specific conditions or privileged access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 3cb93f390453cde4d6afda1587aaa00e75e09617 or d2a89cd942edd50c1e652004fd64019be78b0a96

Vendor Advisory: https://git.kernel.org/stable/c/3cb93f390453cde4d6afda1587aaa00e75e09617

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable GPU recovery features

linux

Prevent GPU recovery operations that trigger the vulnerability

echo 0 > /sys/module/amdgpu/parameters/gpu_recovery

🧯 If You Can't Patch

  • Restrict GPU access to trusted users only
  • Monitor system logs for GPU recovery events and crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if amdgpu module is loaded: lsmod | grep amdgpu && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or is newer than affected versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing 'refcount_t: underflow; use-after-free'
  • GPU recovery messages in dmesg
  • System crashes during GPU operations

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

source="kernel" AND ("refcount_t: underflow" OR "use-after-free" OR "amdgpu_job_free_cb")

🔗 References

📤 Share & Export