CVE-2022-50354

5.5 MEDIUM

📋 TL;DR

This CVE-2022-50354 is a NULL pointer dereference vulnerability in the Linux kernel's AMD GPU driver (amdkfd). It allows local attackers to cause a kernel panic (denial of service) by triggering specific error conditions during GPU process cleanup. Systems using AMD GPUs with the affected kernel driver are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with AMD GPU driver (amdgpu/amdkfd)
Versions: Linux kernel versions before the fix commits (specifically before 29d48b87db64b6697ddad007548e51d032081c59)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD GPUs using the kernel driver. Requires local access to trigger.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

Local denial of service through kernel panic when specific GPU operations fail during process cleanup.

🟢

If Mitigated

Minimal impact if systems have proper access controls preventing local user exploitation.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users or processes could crash the kernel, affecting system stability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger specific GPU driver error conditions. Not trivial but feasible for knowledgeable attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commit 29d48b87db64b6697ddad007548e51d032081c59 or later

Vendor Advisory: https://git.kernel.org/stable/c/29d48b87db64b6697ddad007548e51d032081c59

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commit. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Rebuild kernel if using custom kernel. 4. No reboot required for hotpatch if available.

🔧 Temporary Workarounds

Restrict local access

all

Limit local user access to systems with AMD GPUs to reduce attack surface.

Disable AMD GPU kernel driver

Linux

Remove or blacklist amdgpu/amdkfd modules if GPU functionality not required.

echo 'blacklist amdgpu' >> /etc/modprobe.d/blacklist.conf
echo 'blacklist amdkfd' >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Implement strict access controls to prevent local user exploitation.
  • Monitor system logs for kernel panic events related to AMD GPU driver.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if AMD GPU driver is loaded: 'uname -r' and 'lsmod | grep amdgpu'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commit: 'git log --oneline | grep 29d48b87db64b6697ddad007548e51d032081c59' or check kernel changelog.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning 'NULL pointer dereference'
  • AMD GPU driver error messages in dmesg
  • System crash/reboot events

Network Indicators:

  • None - local exploit only

SIEM Query:

source="kernel" AND ("NULL pointer" OR "amdgpu" OR "amdkfd") AND (panic OR oops OR crash)

🔗 References

📤 Share & Export