CVE-2022-3108: CWE-252 in Kernel
An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().
AI Analysis
Technical Summary
CVE-2022-3108 is a medium-severity vulnerability identified in the Linux kernel, specifically affecting versions through 5.16-rc6 and 5.17-rc6. The flaw exists in the AMD GPU driver component, within the function kfd_parse_subtype_iolink located in drivers/gpu/drm/amd/amdkfd/kfd_crat.c. The vulnerability arises because the function fails to check the return value of the kmemdup() function, which is responsible for duplicating kernel memory. This lack of validation corresponds to CWE-252 (Unchecked Return Value), meaning that if kmemdup() fails (e.g., due to memory allocation failure), the kernel code proceeds without handling the error properly. This can lead to a NULL pointer dereference or use of invalid memory, resulting in a denial of service (DoS) by crashing the kernel or causing instability. The CVSS v3.1 base score is 5.5 (medium), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, requires low privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits are currently reported in the wild. The vulnerability affects Linux kernel versions used in many distributions, especially those employing AMD GPUs with the amdkfd driver, which is common in systems running AMD hardware for GPU compute tasks. The issue is relevant for environments where kernel stability and availability are critical, such as servers, workstations, and embedded systems running vulnerable kernel versions. Since the flaw requires local privileges and low complexity, attackers with limited access could trigger a kernel crash, causing denial of service but not privilege escalation or data compromise. No patch links are provided in the data, but standard practice would be to apply kernel updates once available from distribution maintainers.
Potential Impact
For European organizations, the primary impact of CVE-2022-3108 is the potential for denial of service on Linux systems running vulnerable kernel versions with AMD GPU drivers. This could disrupt critical services, especially in data centers, research institutions, and enterprises relying on AMD GPU-accelerated workloads. While the vulnerability does not allow data theft or privilege escalation, the availability impact can cause operational downtime, affecting business continuity. Organizations using Linux servers with AMD GPUs for compute tasks (e.g., AI, scientific computing, media processing) are particularly at risk. The requirement for local access limits remote exploitation, but insider threats or compromised user accounts could trigger the vulnerability. Given the widespread use of Linux in European public sector, financial institutions, and technology companies, unpatched systems could face service interruptions. Additionally, embedded systems or industrial control systems using affected kernels might experience stability issues, potentially impacting manufacturing or infrastructure operations. The lack of known exploits reduces immediate risk, but the medium severity and ease of triggering a DoS warrant timely mitigation to prevent disruption.
Mitigation Recommendations
1. Apply kernel updates promptly: Monitor Linux distribution security advisories (e.g., Debian, Ubuntu, Red Hat, SUSE) for patches addressing CVE-2022-3108 and deploy them as soon as they become available. 2. Restrict local access: Limit user accounts with local login privileges on systems with AMD GPU drivers to trusted personnel only, reducing the risk of exploitation by unauthorized users. 3. Implement kernel crash monitoring: Deploy monitoring tools that detect kernel panics or crashes to enable rapid response and system recovery. 4. Use kernel lockdown features: Where applicable, enable kernel lockdown or secure boot features to reduce the attack surface and prevent unauthorized kernel modifications. 5. For critical systems, consider isolating AMD GPU workloads or using alternative hardware until patches are applied. 6. Conduct regular audits of installed kernel versions and AMD GPU driver usage to identify vulnerable systems. 7. Educate system administrators about the vulnerability and the importance of applying updates and monitoring system stability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-3108: CWE-252 in Kernel
Description
An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().
AI-Powered Analysis
Technical Analysis
CVE-2022-3108 is a medium-severity vulnerability identified in the Linux kernel, specifically affecting versions through 5.16-rc6 and 5.17-rc6. The flaw exists in the AMD GPU driver component, within the function kfd_parse_subtype_iolink located in drivers/gpu/drm/amd/amdkfd/kfd_crat.c. The vulnerability arises because the function fails to check the return value of the kmemdup() function, which is responsible for duplicating kernel memory. This lack of validation corresponds to CWE-252 (Unchecked Return Value), meaning that if kmemdup() fails (e.g., due to memory allocation failure), the kernel code proceeds without handling the error properly. This can lead to a NULL pointer dereference or use of invalid memory, resulting in a denial of service (DoS) by crashing the kernel or causing instability. The CVSS v3.1 base score is 5.5 (medium), with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, requires low privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No known exploits are currently reported in the wild. The vulnerability affects Linux kernel versions used in many distributions, especially those employing AMD GPUs with the amdkfd driver, which is common in systems running AMD hardware for GPU compute tasks. The issue is relevant for environments where kernel stability and availability are critical, such as servers, workstations, and embedded systems running vulnerable kernel versions. Since the flaw requires local privileges and low complexity, attackers with limited access could trigger a kernel crash, causing denial of service but not privilege escalation or data compromise. No patch links are provided in the data, but standard practice would be to apply kernel updates once available from distribution maintainers.
Potential Impact
For European organizations, the primary impact of CVE-2022-3108 is the potential for denial of service on Linux systems running vulnerable kernel versions with AMD GPU drivers. This could disrupt critical services, especially in data centers, research institutions, and enterprises relying on AMD GPU-accelerated workloads. While the vulnerability does not allow data theft or privilege escalation, the availability impact can cause operational downtime, affecting business continuity. Organizations using Linux servers with AMD GPUs for compute tasks (e.g., AI, scientific computing, media processing) are particularly at risk. The requirement for local access limits remote exploitation, but insider threats or compromised user accounts could trigger the vulnerability. Given the widespread use of Linux in European public sector, financial institutions, and technology companies, unpatched systems could face service interruptions. Additionally, embedded systems or industrial control systems using affected kernels might experience stability issues, potentially impacting manufacturing or infrastructure operations. The lack of known exploits reduces immediate risk, but the medium severity and ease of triggering a DoS warrant timely mitigation to prevent disruption.
Mitigation Recommendations
1. Apply kernel updates promptly: Monitor Linux distribution security advisories (e.g., Debian, Ubuntu, Red Hat, SUSE) for patches addressing CVE-2022-3108 and deploy them as soon as they become available. 2. Restrict local access: Limit user accounts with local login privileges on systems with AMD GPU drivers to trusted personnel only, reducing the risk of exploitation by unauthorized users. 3. Implement kernel crash monitoring: Deploy monitoring tools that detect kernel panics or crashes to enable rapid response and system recovery. 4. Use kernel lockdown features: Where applicable, enable kernel lockdown or secure boot features to reduce the attack surface and prevent unauthorized kernel modifications. 5. For critical systems, consider isolating AMD GPU workloads or using alternative hardware until patches are applied. 6. Conduct regular audits of installed kernel versions and AMD GPU driver usage to identify vulnerable systems. 7. Educate system administrators about the vulnerability and the importance of applying updates and monitoring system stability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf74e5
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 5:54:44 PM
Last updated: 7/28/2025, 8:40:06 AM
Views: 12
Related Threats
CVE-2025-8046: CWE-79 Cross-Site Scripting (XSS) in Injection Guard
MediumCVE-2025-7808: CWE-79 Cross-Site Scripting (XSS) in WP Shopify
HighCVE-2025-6790: CWE-352 Cross-Site Request Forgery (CSRF) in Quiz and Survey Master (QSM)
HighCVE-2025-3414: CWE-79 Cross-Site Scripting (XSS) in Structured Content (JSON-LD) #wpsc
HighCVE-2025-8938: Backdoor in TOTOLINK N350R
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.