CVE-2022-49232: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() In amdgpu_dm_connector_add_common_modes(), amdgpu_dm_create_common_mode() is assigned to mode and is passed to drm_mode_probed_add() directly after that. drm_mode_probed_add() passes &mode->head to list_add_tail(), and there is a dereference of it in list_add_tail() without recoveries, which could lead to NULL pointer dereference on failure of amdgpu_dm_create_common_mode(). Fix this by adding a NULL check of mode. This bug was found by a static analyzer. Builds with 'make allyesconfig' show no new warnings, and our static analyzer no longer warns about this code.
AI Analysis
Technical Summary
CVE-2022-49232 is a vulnerability identified in the Linux kernel specifically within the AMD GPU Direct Rendering Manager (DRM) driver code, in the function amdgpu_dm_connector_add_common_modes(). The flaw arises due to a missing NULL pointer check after the call to amdgpu_dm_create_common_mode(), which returns a pointer assigned to the variable 'mode'. This pointer is then passed directly to drm_mode_probed_add(), which internally dereferences mode->head without verifying if 'mode' is NULL. If amdgpu_dm_create_common_mode() fails and returns NULL, the subsequent dereference leads to a NULL pointer dereference, causing a kernel crash (denial of service). The vulnerability was discovered via static code analysis and fixed by adding the necessary NULL check to prevent the kernel from dereferencing a NULL pointer. The affected component is part of the AMD GPU display driver stack in the Linux kernel, which is widely used in various Linux distributions and environments. There is no indication of known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability impacts kernel stability and availability but does not directly indicate privilege escalation or data confidentiality compromise. The fix involves a code patch to add proper NULL pointer validation before dereferencing pointers in the affected function.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on systems running Linux kernels with the affected AMD GPU driver versions. Systems using AMD GPUs with the amdgpu driver in Linux environments—common in enterprise servers, workstations, and desktops—may experience kernel crashes if the vulnerability is triggered. This can lead to system instability, unexpected reboots, or downtime, potentially disrupting business operations, especially in environments relying on Linux for critical workloads or graphical processing tasks. While the vulnerability does not appear to allow privilege escalation or data leakage, the availability impact could affect services dependent on affected Linux systems. Organizations running AMD GPU-enabled Linux servers or workstations should be aware of this risk. The lack of known exploits suggests the threat is currently low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch fixing CVE-2022-49232. Since the vulnerability is in the amdgpu driver, kernel updates from trusted Linux distribution vendors (e.g., Ubuntu, Debian, Red Hat, SUSE) should be applied promptly. For environments where immediate kernel upgrades are challenging, organizations can consider temporarily disabling the AMD GPU driver if feasible, or restricting access to systems with AMD GPUs to trusted users only to reduce accidental triggering. Monitoring system logs for kernel oops or crashes related to amdgpu_dm_connector_add_common_modes() can help detect attempts or occurrences of this issue. Additionally, organizations should maintain robust backup and recovery procedures to mitigate downtime impact. Engaging with Linux distribution security advisories and subscribing to relevant vulnerability notifications will ensure timely awareness of patches and related threats.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-49232: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() In amdgpu_dm_connector_add_common_modes(), amdgpu_dm_create_common_mode() is assigned to mode and is passed to drm_mode_probed_add() directly after that. drm_mode_probed_add() passes &mode->head to list_add_tail(), and there is a dereference of it in list_add_tail() without recoveries, which could lead to NULL pointer dereference on failure of amdgpu_dm_create_common_mode(). Fix this by adding a NULL check of mode. This bug was found by a static analyzer. Builds with 'make allyesconfig' show no new warnings, and our static analyzer no longer warns about this code.
AI-Powered Analysis
Technical Analysis
CVE-2022-49232 is a vulnerability identified in the Linux kernel specifically within the AMD GPU Direct Rendering Manager (DRM) driver code, in the function amdgpu_dm_connector_add_common_modes(). The flaw arises due to a missing NULL pointer check after the call to amdgpu_dm_create_common_mode(), which returns a pointer assigned to the variable 'mode'. This pointer is then passed directly to drm_mode_probed_add(), which internally dereferences mode->head without verifying if 'mode' is NULL. If amdgpu_dm_create_common_mode() fails and returns NULL, the subsequent dereference leads to a NULL pointer dereference, causing a kernel crash (denial of service). The vulnerability was discovered via static code analysis and fixed by adding the necessary NULL check to prevent the kernel from dereferencing a NULL pointer. The affected component is part of the AMD GPU display driver stack in the Linux kernel, which is widely used in various Linux distributions and environments. There is no indication of known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability impacts kernel stability and availability but does not directly indicate privilege escalation or data confidentiality compromise. The fix involves a code patch to add proper NULL pointer validation before dereferencing pointers in the affected function.
Potential Impact
For European organizations, this vulnerability primarily poses a risk of denial of service on systems running Linux kernels with the affected AMD GPU driver versions. Systems using AMD GPUs with the amdgpu driver in Linux environments—common in enterprise servers, workstations, and desktops—may experience kernel crashes if the vulnerability is triggered. This can lead to system instability, unexpected reboots, or downtime, potentially disrupting business operations, especially in environments relying on Linux for critical workloads or graphical processing tasks. While the vulnerability does not appear to allow privilege escalation or data leakage, the availability impact could affect services dependent on affected Linux systems. Organizations running AMD GPU-enabled Linux servers or workstations should be aware of this risk. The lack of known exploits suggests the threat is currently low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the bug.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions that include the patch fixing CVE-2022-49232. Since the vulnerability is in the amdgpu driver, kernel updates from trusted Linux distribution vendors (e.g., Ubuntu, Debian, Red Hat, SUSE) should be applied promptly. For environments where immediate kernel upgrades are challenging, organizations can consider temporarily disabling the AMD GPU driver if feasible, or restricting access to systems with AMD GPUs to trusted users only to reduce accidental triggering. Monitoring system logs for kernel oops or crashes related to amdgpu_dm_connector_add_common_modes() can help detect attempts or occurrences of this issue. Additionally, organizations should maintain robust backup and recovery procedures to mitigate downtime impact. Engaging with Linux distribution security advisories and subscribing to relevant vulnerability notifications will ensure timely awareness of patches and related threats.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.293Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe536a
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 4:39:54 AM
Last updated: 8/12/2025, 7:20:19 PM
Views: 12
Related Threats
CVE-2025-9000: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8993: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8992: Cross-Site Request Forgery in mtons mblog
MediumCVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.