CVE-2022-49529

5.5 MEDIUM

📋 TL;DR

A null pointer dereference vulnerability in the Linux kernel's AMD GPU driver (amdgpu) can cause kernel panics when the software SMU (System Management Unit) is disabled. This affects systems with AMD graphics hardware running vulnerable Linux kernel versions, potentially leading to denial of service.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU driver (amdgpu)
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD graphics hardware where software SMU is disabled. VirtualBox environment shown in crash log but affects physical hardware too.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.

🟠

Likely Case

System crash when specific GPU operations are performed with software SMU disabled, requiring reboot.

🟢

If Mitigated

No impact if patched or if software SMU is enabled in system configuration.

🌐 Internet-Facing: LOW - Requires local access or ability to execute code on the system.
🏢 Internal Only: MEDIUM - Local users or processes with GPU access can trigger crashes affecting system availability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to trigger GPU context operations (like through amdgpu_test or similar tools). No authentication bypass needed but requires local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits 49ec3441aa5e5940f3e82dd2f0205b9c856e399d and eea5c7b3390c6e006ba4cbd906447dd8cea8cfbf

Vendor Advisory: https://git.kernel.org/stable/c/49ec3441aa5e5940f3e82dd2f0205b9c856e399d

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Enable software SMU

linux

Ensure software SMU is enabled in system configuration to avoid the null pointer condition

Check current SMU status: cat /sys/module/amdgpu/parameters/smu_enabled
Enable via kernel parameter: amdgpu.smu_enabled=1

🧯 If You Can't Patch

  • Restrict GPU access to trusted users only
  • Monitor for kernel panic events and investigate any amdgpu-related crashes

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if amdgpu module is loaded: uname -r && lsmod | grep amdgpu

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits or check if patch is applied in kernel source

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages mentioning 'amdgpu_dpm_force_performance_level'
  • NULL pointer dereference at address 0000000000000078
  • amdgpu_test process crashes

Network Indicators:

  • None - local vulnerability only

SIEM Query:

kernel.panic OR (amdgpu AND null AND pointer) OR (process.name:amdgpu_test AND exit_code:139)

🔗 References

📤 Share & Export