Skip to main content

CVE-2022-3112: CWE-476 in Kernel

Medium
VulnerabilityCVE-2022-3112cvecve-2022-3112cwe-476
Published: Wed Dec 14 2022 (12/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Kernel

Description

An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.

AI-Powered Analysis

AILast updated: 06/21/2025, 17:51:08 UTC

Technical Analysis

CVE-2022-3112 is a medium-severity vulnerability identified in the Linux kernel version 5.16-rc6, specifically within the amvdec_set_canvases function located in drivers/staging/media/meson/vdec/vdec_helpers.c. The root cause is a null pointer dereference resulting from the function's failure to check the return value of kzalloc(), a kernel memory allocation function. If kzalloc() fails and returns NULL, subsequent dereferencing leads to a kernel NULL pointer dereference (CWE-476). This vulnerability affects the kernel's media subsystem, particularly the Meson VDEC (video decoder) driver, which is part of the staging drivers and may be used in certain embedded or multimedia-focused Linux environments. The CVSS v3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H indicating that the attack requires local access with low privileges, no user interaction, and results in a high impact on availability due to kernel crash or denial of service. There is no known public exploit in the wild, and no official patch links are provided in the data, though the issue was reserved by Red Hat and enriched by CISA, indicating recognition by major security entities. The vulnerability does not impact confidentiality or integrity but can cause system instability or crashes, affecting availability. The affected kernel version is a release candidate (5.16-rc6), which suggests that stable releases may not be affected or have already addressed this issue. The staging nature of the driver implies it may not be enabled or used in all Linux distributions or devices, limiting the scope somewhat. However, systems running this kernel version with the Meson VDEC driver enabled are vulnerable to local denial of service attacks through triggering the null pointer dereference in the video decoding subsystem.

Potential Impact

For European organizations, the primary impact of CVE-2022-3112 is the potential for local denial of service on Linux systems running kernel 5.16-rc6 with the Meson VDEC driver enabled. This could lead to system crashes or reboots, disrupting services that rely on these systems. Organizations using embedded Linux devices or multimedia systems based on the affected kernel version may experience operational interruptions. Since the vulnerability requires local access with low privileges, the risk is higher in environments where untrusted users or processes have local system access, such as multi-tenant servers, shared workstations, or devices exposed to less controlled user bases. The lack of impact on confidentiality or integrity reduces the risk of data breaches or unauthorized data modification. However, availability disruptions can affect critical infrastructure, especially in sectors relying on embedded Linux devices for media processing, such as telecommunications, broadcasting, or industrial control systems. Given the limited scope of affected kernel versions and the staging driver status, widespread impact is unlikely, but targeted attacks or accidental crashes could still pose operational challenges.

Mitigation Recommendations

1. Upgrade to a stable Linux kernel version beyond 5.16-rc6 where this vulnerability is patched or the affected driver is updated. Since 5.16-rc6 is a release candidate, stable releases should be preferred for production environments. 2. Audit systems to identify the presence and usage of the Meson VDEC driver; disable or blacklist the driver if it is not required to reduce the attack surface. 3. Restrict local access to trusted users only, employing strict access controls and user privilege management to prevent unprivileged users from exploiting this vulnerability. 4. Implement kernel hardening techniques such as kernel address space layout randomization (KASLR) and memory protection features to mitigate exploitation impact. 5. Monitor system logs and kernel crash reports for signs of null pointer dereference or unexpected reboots that could indicate exploitation attempts. 6. For embedded or specialized devices using this kernel version, coordinate with vendors for firmware or kernel updates addressing this issue. 7. Employ containerization or sandboxing to isolate processes that might trigger this vulnerability, limiting the scope of potential denial of service.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7588

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 5:51:08 PM

Last updated: 7/31/2025, 8:25:12 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats