Skip to main content

CVE-2022-49773: Vulnerability in Linux Linux

Low
VulnerabilityCVE-2022-49773cvecve-2022-49773
Published: Thu May 01 2025 (05/01/2025, 14:09:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix optc2_configure warning on dcn314 [Why] dcn314 uses optc2_configure_crc() that wraps optc1_configure_crc() + set additional registers not applicable to dcn314. It's not critical but when used leads to warning like: WARNING: drivers/gpu/drm/amd/amdgpu/../display/dc/dc_helper.c Call Trace: <TASK> generic_reg_set_ex+0x6d/0xe0 [amdgpu] optc2_configure_crc+0x60/0x80 [amdgpu] dc_stream_configure_crc+0x129/0x150 [amdgpu] amdgpu_dm_crtc_configure_crc_source+0x5d/0xe0 [amdgpu] [How] Use optc1_configure_crc() directly

AI-Powered Analysis

AILast updated: 06/30/2025, 01:25:23 UTC

Technical Analysis

CVE-2022-49773 is a vulnerability identified in the Linux kernel specifically related to the AMD GPU driver component, within the Direct Rendering Manager (DRM) subsystem. The issue arises in the handling of the display controller's CRC (Cyclic Redundancy Check) configuration for the DCN3.14 (Display Core Next generation 3.14) hardware. The vulnerability is due to the use of the function optc2_configure_crc(), which internally calls optc1_configure_crc() and attempts to set additional registers that are not applicable to the DCN3.14 hardware. This results in warnings during operation, as the driver attempts to configure CRC sources incorrectly for this specific hardware generation. The root cause is a mismatch in the driver logic where optc2_configure_crc() is used instead of directly calling optc1_configure_crc(), which is the correct function for DCN3.14. While the issue does not lead to a crash or direct security compromise, it generates kernel warnings that could indicate improper hardware handling and potentially impact system stability or reliability under certain conditions. The fix involves modifying the driver code to call optc1_configure_crc() directly for DCN3.14, avoiding the inappropriate register writes and eliminating the warning messages. There are no known exploits in the wild, and the vulnerability does not have an assigned CVSS score, indicating it is not considered a critical security flaw but rather a correctness and stability issue within the AMD GPU driver in Linux kernels containing this code version.

Potential Impact

For European organizations, the impact of CVE-2022-49773 is expected to be low in terms of direct security risk, as the vulnerability does not allow for privilege escalation, code execution, or data leakage. However, organizations relying on Linux systems with AMD GPUs, particularly those using hardware with DCN3.14 display controllers, may experience kernel warnings that could complicate system diagnostics or indicate subtle driver misbehavior. In environments where system stability and reliability are critical—such as data centers, financial institutions, or industrial control systems—these warnings could lead to increased maintenance overhead or reduced confidence in system health monitoring. Additionally, if these warnings are ignored, they might mask other issues or delay detection of more severe problems. Since the vulnerability affects the AMD GPU driver, organizations using AMD graphics hardware in Linux-based workstations or servers could see minor disruptions or degraded user experience, but no direct compromise of confidentiality, integrity, or availability is expected.

Mitigation Recommendations

To mitigate this issue, European organizations should ensure that their Linux kernel versions are updated to include the fix that replaces the call to optc2_configure_crc() with optc1_configure_crc() for DCN3.14 hardware. This requires applying the latest stable Linux kernel updates or AMD GPU driver patches from trusted sources. System administrators should audit their Linux systems to identify those running AMD GPUs with DCN3.14 display controllers and prioritize patching these systems. Additionally, monitoring kernel logs for the specific warning messages can help identify affected systems before patching. For organizations compiling custom kernels, reviewing the amdgpu driver code to verify the correct function usage is recommended. Since no known exploits exist, immediate emergency response is not necessary, but timely patching will improve system stability and reduce noise in system logs. Maintaining good hardware inventory and driver version control will also help manage this and similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T07:17:33.805Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4b31

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 1:25:23 AM

Last updated: 8/14/2025, 9:29:48 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats