CVE-2022-49971

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the AMD GPU driver within the Linux kernel. When the GPU metrics table allocation isn't properly freed during driver cleanup, it causes gradual memory consumption. This affects Linux systems with AMD graphics hardware using the vulnerable driver version.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU driver (drm/amd/pm)
Versions: Linux kernel versions containing the vulnerable code (specific versions not specified in CVE, but patches available in stable branches)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD GPU hardware and the vulnerable driver component to be loaded/active.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, crashes, or denial of service on affected systems.

🟠

Likely Case

Gradual memory consumption over time during GPU driver operations, potentially leading to performance degradation or system instability after extended use.

🟢

If Mitigated

Minimal impact with proper memory management and system monitoring in place.

🌐 Internet-Facing: LOW - This is a local kernel driver vulnerability requiring local access or compromised user account.
🏢 Internal Only: MEDIUM - Could be exploited by malicious local users or malware to degrade system performance or cause instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger GPU driver operations repeatedly to cause memory exhaustion.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in Linux kernel stable releases via commits 4b25bdb54578f3b96ff055e5d27bc1cb82950e51 and 5afb76522a0af0513b6dc01f84128a73206b051b

Vendor Advisory: https://git.kernel.org/stable/c/4b25bdb54578f3b96ff055e5d27bc1cb82950e51

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version and that AMD GPU driver loads correctly.

🔧 Temporary Workarounds

Disable AMD GPU driver

linux

Prevent loading of vulnerable driver module if AMD GPU not required

echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Monitor system memory usage and restart systems showing abnormal memory consumption
  • Restrict local user access to systems with vulnerable drivers

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if AMD GPU driver is loaded: lsmod | grep amdgpu && uname -r

Check Version:

uname -r

Verify Fix Applied:

Verify kernel is updated to patched version and AMD GPU driver functions normally

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • System memory exhaustion warnings
  • AMD GPU driver error messages

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("oom" OR "out of memory" OR "amdgpu")

🔗 References

📤 Share & Export