Skip to main content

CVE-2022-49365: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49365cvecve-2022-49365
Published: Wed Feb 26 2025 (02/26/2025, 02:11:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq() The > ARRAY_SIZE() should be >= ARRAY_SIZE() to prevent an out of bounds access.

AI-Powered Analysis

AILast updated: 06/30/2025, 06:27:23 UTC

Technical Analysis

CVE-2022-49365 is a vulnerability identified in the Linux kernel specifically within the Direct Rendering Manager (DRM) subsystem for AMD GPUs (amdgpu driver). The flaw is an off-by-one error in the function dm_dmub_outbox1_low_irq(). This function handles interrupt requests related to the DMUB (Display Microcontroller Unit) outbox, which is part of the communication mechanism between the GPU and the host system. The vulnerability arises because the code uses a comparison operator '>' when it should use '>=' in relation to ARRAY_SIZE(), leading to a potential out-of-bounds access. This off-by-one error can cause the kernel to read or write memory beyond the allocated array bounds. Such out-of-bounds access can lead to undefined behavior including memory corruption, kernel crashes (denial of service), or potentially privilege escalation if exploited to manipulate kernel memory. The vulnerability affects specific Linux kernel versions identified by commit hashes, indicating it is present in certain recent kernel builds before the patch. No known exploits are reported in the wild as of the publication date, and no CVSS score has been assigned yet. However, the nature of the flaw in a critical kernel driver handling GPU interrupts means it could be leveraged by a local attacker or malicious code with some level of access to cause system instability or escalate privileges. The vulnerability is resolved by correcting the boundary check to use '>=' instead of '>' to prevent out-of-bounds access.

Potential Impact

For European organizations, the impact of CVE-2022-49365 can be significant, especially those relying on Linux servers or workstations with AMD GPUs for critical workloads such as scientific computing, media processing, or cloud infrastructure. Exploitation could lead to system crashes causing denial of service, disrupting business operations. More critically, if exploited for privilege escalation, attackers could gain unauthorized root access, compromising confidentiality and integrity of sensitive data. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government agencies within Europe. Additionally, organizations using Linux-based virtualized environments or container platforms with AMD GPU passthrough could see increased risk exposure. Although no active exploits are known, the vulnerability’s presence in the kernel means it could be targeted by advanced threat actors aiming to exploit local access vectors or malware to gain persistence or lateral movement. The impact is compounded by the widespread use of Linux in European data centers and the growing adoption of AMD GPUs in enterprise environments.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that correct the boundary check in the amdgpu driver. Since this is a kernel-level vulnerability, updating to the latest stable kernel version containing the fix is the most effective mitigation. For environments where immediate patching is challenging, organizations should implement strict access controls to limit local user privileges and restrict untrusted code execution on systems with AMD GPUs. Employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and enabling kernel lockdown modes can reduce exploitation likelihood. Monitoring system logs for unusual GPU driver errors or kernel oops messages may help detect attempted exploitation. Additionally, organizations should review and limit the use of AMD GPU passthrough in virtualized environments unless necessary, and ensure that container runtimes do not expose unnecessary GPU access. Regular vulnerability scanning and integration of this CVE into patch management workflows will ensure timely remediation. Finally, maintaining robust endpoint detection and response (EDR) solutions can help identify suspicious activities related to kernel exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.554Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe57d5

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:27:23 AM

Last updated: 7/30/2025, 1:26:57 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats