CVE-2022-49529
📋 TL;DR
A null pointer dereference vulnerability in the Linux kernel's AMD GPU driver (amdgpu) can cause kernel panics when the software SMU (System Management Unit) is disabled. This affects systems with AMD graphics hardware running vulnerable Linux kernel versions, potentially leading to denial of service.
💻 Affected Systems
- Linux kernel with AMD GPU driver (amdgpu)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.
Likely Case
System crash when specific GPU operations are performed with software SMU disabled, requiring reboot.
If Mitigated
No impact if patched or if software SMU is enabled in system configuration.
🎯 Exploit Status
Exploitation requires ability to trigger GPU context operations (like through amdgpu_test or similar tools). No authentication bypass needed but requires local access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in kernel commits 49ec3441aa5e5940f3e82dd2f0205b9c856e399d and eea5c7b3390c6e006ba4cbd906447dd8cea8cfbf
Vendor Advisory: https://git.kernel.org/stable/c/49ec3441aa5e5940f3e82dd2f0205b9c856e399d
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Enable software SMU
linuxEnsure software SMU is enabled in system configuration to avoid the null pointer condition
Check current SMU status: cat /sys/module/amdgpu/parameters/smu_enabled
Enable via kernel parameter: amdgpu.smu_enabled=1
🧯 If You Can't Patch
- Restrict GPU access to trusted users only
- Monitor for kernel panic events and investigate any amdgpu-related crashes
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if amdgpu module is loaded: uname -r && lsmod | grep amdgpu
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is after fix commits or check if patch is applied in kernel source
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages mentioning 'amdgpu_dpm_force_performance_level'
- NULL pointer dereference at address 0000000000000078
- amdgpu_test process crashes
Network Indicators:
- None - local vulnerability only
SIEM Query:
kernel.panic OR (amdgpu AND null AND pointer) OR (process.name:amdgpu_test AND exit_code:139)