CVE-2022-50303

7.8 HIGH

📋 TL;DR

This CVE describes a double-free vulnerability in the Linux kernel's AMD GPU driver (amdgpu) that occurs when process initialization fails. The vulnerability allows a local attacker to cause a kernel panic or potentially execute arbitrary code with kernel privileges. Systems using AMD GPUs with the affected kernel driver are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU driver (amdgpu)
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD GPUs using the amdgpu driver. The vulnerability triggers during process initialization failure scenarios.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to denial of service, or potential privilege escalation to kernel level allowing complete system compromise.

🟠

Likely Case

Kernel panic causing system crash and denial of service.

🟢

If Mitigated

System remains stable with proper patching; no impact if not using affected AMD GPU drivers.

🌐 Internet-Facing: LOW - Requires local access to exploit.
🏢 Internal Only: MEDIUM - Local users or compromised accounts could exploit this to crash systems or potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger the specific failure condition in the GPU driver initialization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 1a799c4c190ea9f0e81028e3eb3037ed0ab17ff5, 89f0d766c9e3fdeafbed6f855d433c2768cde862, or a02c07b619899179384fde06f951530438a3512d

Vendor Advisory: https://git.kernel.org/stable/c/1a799c4c190ea9f0e81028e3eb3037ed0ab17ff5

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable AMD GPU driver

linux

Temporarily disable the amdgpu kernel module to prevent exploitation

echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist-amdgpu.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Restrict local user access to systems with AMD GPUs
  • Monitor for kernel panic events and the specific warning messages shown in the CVE description

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if amdgpu module is loaded: 'uname -r' and 'lsmod | grep amdgpu'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated and check dmesg for absence of 'ida_free called for id=... which is not allocated' warnings

📡 Detection & Monitoring

Log Indicators:

  • Kernel logs showing 'ida_free called for id=... which is not allocated'
  • Kernel panic logs
  • NULL pointer dereference in kernel logs

Network Indicators:

  • No network indicators - local vulnerability

SIEM Query:

source="kernel" AND ("ida_free called" OR "NULL pointer dereference" OR "amdgpu_pasid_free_delayed")

🔗 References

📤 Share & Export