Skip to main content

CVE-2022-49232: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49232cvecve-2022-49232
Published: Wed Feb 26 2025 (02/26/2025, 01:55:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() In amdgpu_dm_connector_add_common_modes(), amdgpu_dm_create_common_mode() is assigned to mode and is passed to drm_mode_probed_add() directly after that. drm_mode_probed_add() passes &mode->head to list_add_tail(), and there is a dereference of it in list_add_tail() without recoveries, which could lead to NULL pointer dereference on failure of amdgpu_dm_create_common_mode(). Fix this by adding a NULL check of mode. This bug was found by a static analyzer. Builds with 'make allyesconfig' show no new warnings, and our static analyzer no longer warns about this code.

AI-Powered Analysis

AILast updated: 06/30/2025, 04:39:54 UTC

Technical Analysis

CVE-2022-49232 is a vulnerability identified in the Linux kernel specifically within the AMD GPU Direct Rendering Manager (DRM) driver code, in the function amdgpu_dm_connector_add_common_modes(). The flaw arises due to a missing NULL pointer check after the call to amdgpu_dm_create_common_mode(), which returns a pointer assigned to the variable 'mode'. This pointer is then passed directly to drm_mode_probed_add(), which internally dereferences mode->head without verifying if 'mode' is NULL. If amdgpu_dm_create_common_mode() fails and returns NULL, the subsequent dereference leads to a NULL pointer dereference, causing a kernel crash (denial of service). The vulnerability was discovered via static code analysis and fixed by adding the necessary NULL check to prevent the kernel from dereferencing a NULL pointer. The affected component is part of the AMD GPU display driver stack in the Linux kernel, which is widely used in various Linux distributions and environments. There is no indication of known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability impacts kernel stability and availability but does not directly indicate privilege escalation or data confidentiality compromise. The fix involves a code patch to add proper NULL pointer validation before dereferencing pointers in the affected function.

Potential Impact

For European organizations, this vulnerability primarily poses a risk of denial of service on systems running Linux kernels with the affected AMD GPU driver versions. Systems using AMD GPUs with the amdgpu driver in Linux environments—common in enterprise servers, workstations, and desktops—may experience kernel crashes if the vulnerability is triggered. This can lead to system instability, unexpected reboots, or downtime, potentially disrupting business operations, especially in environments relying on Linux for critical workloads or graphical processing tasks. While the vulnerability does not appear to allow privilege escalation or data leakage, the availability impact could affect services dependent on affected Linux systems. Organizations running AMD GPU-enabled Linux servers or workstations should be aware of this risk. The lack of known exploits suggests the threat is currently low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions that include the patch fixing CVE-2022-49232. Since the vulnerability is in the amdgpu driver, kernel updates from trusted Linux distribution vendors (e.g., Ubuntu, Debian, Red Hat, SUSE) should be applied promptly. For environments where immediate kernel upgrades are challenging, organizations can consider temporarily disabling the AMD GPU driver if feasible, or restricting access to systems with AMD GPUs to trusted users only to reduce accidental triggering. Monitoring system logs for kernel oops or crashes related to amdgpu_dm_connector_add_common_modes() can help detect attempts or occurrences of this issue. Additionally, organizations should maintain robust backup and recovery procedures to mitigate downtime impact. Engaging with Linux distribution security advisories and subscribing to relevant vulnerability notifications will ensure timely awareness of patches and related threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.293Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe536a

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 4:39:54 AM

Last updated: 8/12/2025, 7:20:19 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats