Skip to main content

CVE-2022-49203: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49203cvecve-2022-49203
Published: Wed Feb 26 2025 (02/26/2025, 01:55:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix double free during GPU reset on DC streams [Why] The issue only occurs during the GPU reset code path. We first backup the current state prior to commiting 0 streams internally from DM to DC. This state backup contains valid link encoder assignments. DC will clear the link encoder assignments as part of current state (but not the backup, since it was a copied before the commit) and free the extra stream reference it held. DC requires that the link encoder assignments remain cleared/invalid prior to commiting. Since the backup still has valid assignments we call the interface post reset to clear them. This routine also releases the extra reference that the link encoder interface held - resulting in a double free (and eventually a NULL pointer dereference). [How] We'll have to do a full DC commit anyway after GPU reset because the stream count previously went to 0. We don't need to retain the assignment that we had backed up, so just copy off of the now clean current state assignment after the reset has occcurred with the new link_enc_cfg_copy() interface.

AI-Powered Analysis

AILast updated: 06/30/2025, 04:11:30 UTC

Technical Analysis

CVE-2022-49203 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the AMD GPU display driver code. The flaw arises during the GPU reset process on Display Core (DC) streams, where a double free condition occurs. The vulnerability is rooted in the handling of link encoder assignments during the GPU reset sequence. Initially, the current state, which includes valid link encoder assignments, is backed up before committing zero streams internally from the Display Manager (DM) to DC. During the reset, DC clears the link encoder assignments in the current state but not in the backup, which still holds valid assignments. Subsequently, an interface is called post-reset to clear these assignments in the backup, which also releases an extra reference held by the link encoder interface. This results in a double free of the same memory resource, leading to a NULL pointer dereference. Such a memory management error can cause system instability, crashes, or potentially be exploited for arbitrary code execution if an attacker can trigger the GPU reset path. The fix involves ensuring that after the GPU reset, the backup state does not retain the old assignments by copying from the now clean current state using a new interface, thereby preventing the double free. This vulnerability affects specific Linux kernel versions identified by commit hashes, and no known exploits are currently reported in the wild.

Potential Impact

For European organizations, the impact of CVE-2022-49203 can be significant, particularly for those relying on Linux-based systems with AMD GPUs in critical infrastructure, data centers, or enterprise environments. The vulnerability can lead to system crashes or denial of service due to the double free and NULL pointer dereference during GPU resets. In scenarios where GPU reset operations are frequent or can be triggered remotely or by unprivileged users, this could be leveraged to disrupt services or potentially escalate privileges if combined with other vulnerabilities. Industries such as finance, telecommunications, research institutions, and government agencies that utilize Linux servers or workstations with AMD GPUs could face operational disruptions. Additionally, embedded systems or edge devices running vulnerable Linux kernels might be affected, impacting IoT deployments and industrial control systems. While no active exploits are known, the presence of this vulnerability in widely used Linux kernels necessitates prompt attention to avoid future exploitation risks.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the patched versions that address CVE-2022-49203. Since the vulnerability is in the kernel DRM AMD display driver, kernel upgrades or backported patches from trusted Linux distributions (e.g., Debian, Ubuntu, Red Hat, SUSE) should be applied promptly. Organizations should audit their systems to identify those running affected kernel versions and AMD GPU hardware. For environments where immediate patching is challenging, consider implementing monitoring for abnormal GPU reset events or crashes as an early warning. Additionally, restrict unprivileged user access to GPU reset operations and ensure that GPU drivers and related firmware are kept up to date. In virtualized or containerized environments, ensure that GPU passthrough or sharing configurations do not expose the vulnerability to guest systems. Finally, maintain robust incident response plans to quickly address any instability or suspicious activity related to GPU resets.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.291Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5252

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 4:11:30 AM

Last updated: 8/4/2025, 4:41:24 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats