CVE-2022-3112: CWE-476 in Kernel
An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
AI Analysis
Technical Summary
CVE-2022-3112 is a medium-severity vulnerability identified in the Linux kernel version 5.16-rc6, specifically within the amvdec_set_canvases function located in drivers/staging/media/meson/vdec/vdec_helpers.c. The root cause is a null pointer dereference resulting from the function's failure to check the return value of kzalloc(), a kernel memory allocation function. If kzalloc() fails and returns NULL, subsequent dereferencing leads to a kernel NULL pointer dereference (CWE-476). This vulnerability affects the kernel's media subsystem, particularly the Meson VDEC (video decoder) driver, which is part of the staging drivers and may be used in certain embedded or multimedia-focused Linux environments. The CVSS v3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H indicating that the attack requires local access with low privileges, no user interaction, and results in a high impact on availability due to kernel crash or denial of service. There is no known public exploit in the wild, and no official patch links are provided in the data, though the issue was reserved by Red Hat and enriched by CISA, indicating recognition by major security entities. The vulnerability does not impact confidentiality or integrity but can cause system instability or crashes, affecting availability. The affected kernel version is a release candidate (5.16-rc6), which suggests that stable releases may not be affected or have already addressed this issue. The staging nature of the driver implies it may not be enabled or used in all Linux distributions or devices, limiting the scope somewhat. However, systems running this kernel version with the Meson VDEC driver enabled are vulnerable to local denial of service attacks through triggering the null pointer dereference in the video decoding subsystem.
Potential Impact
For European organizations, the primary impact of CVE-2022-3112 is the potential for local denial of service on Linux systems running kernel 5.16-rc6 with the Meson VDEC driver enabled. This could lead to system crashes or reboots, disrupting services that rely on these systems. Organizations using embedded Linux devices or multimedia systems based on the affected kernel version may experience operational interruptions. Since the vulnerability requires local access with low privileges, the risk is higher in environments where untrusted users or processes have local system access, such as multi-tenant servers, shared workstations, or devices exposed to less controlled user bases. The lack of impact on confidentiality or integrity reduces the risk of data breaches or unauthorized data modification. However, availability disruptions can affect critical infrastructure, especially in sectors relying on embedded Linux devices for media processing, such as telecommunications, broadcasting, or industrial control systems. Given the limited scope of affected kernel versions and the staging driver status, widespread impact is unlikely, but targeted attacks or accidental crashes could still pose operational challenges.
Mitigation Recommendations
1. Upgrade to a stable Linux kernel version beyond 5.16-rc6 where this vulnerability is patched or the affected driver is updated. Since 5.16-rc6 is a release candidate, stable releases should be preferred for production environments. 2. Audit systems to identify the presence and usage of the Meson VDEC driver; disable or blacklist the driver if it is not required to reduce the attack surface. 3. Restrict local access to trusted users only, employing strict access controls and user privilege management to prevent unprivileged users from exploiting this vulnerability. 4. Implement kernel hardening techniques such as kernel address space layout randomization (KASLR) and memory protection features to mitigate exploitation impact. 5. Monitor system logs and kernel crash reports for signs of null pointer dereference or unexpected reboots that could indicate exploitation attempts. 6. For embedded or specialized devices using this kernel version, coordinate with vendors for firmware or kernel updates addressing this issue. 7. Employ containerization or sandboxing to isolate processes that might trigger this vulnerability, limiting the scope of potential denial of service.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2022-3112: CWE-476 in Kernel
Description
An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
AI-Powered Analysis
Technical Analysis
CVE-2022-3112 is a medium-severity vulnerability identified in the Linux kernel version 5.16-rc6, specifically within the amvdec_set_canvases function located in drivers/staging/media/meson/vdec/vdec_helpers.c. The root cause is a null pointer dereference resulting from the function's failure to check the return value of kzalloc(), a kernel memory allocation function. If kzalloc() fails and returns NULL, subsequent dereferencing leads to a kernel NULL pointer dereference (CWE-476). This vulnerability affects the kernel's media subsystem, particularly the Meson VDEC (video decoder) driver, which is part of the staging drivers and may be used in certain embedded or multimedia-focused Linux environments. The CVSS v3.1 base score is 5.5 (medium), with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H indicating that the attack requires local access with low privileges, no user interaction, and results in a high impact on availability due to kernel crash or denial of service. There is no known public exploit in the wild, and no official patch links are provided in the data, though the issue was reserved by Red Hat and enriched by CISA, indicating recognition by major security entities. The vulnerability does not impact confidentiality or integrity but can cause system instability or crashes, affecting availability. The affected kernel version is a release candidate (5.16-rc6), which suggests that stable releases may not be affected or have already addressed this issue. The staging nature of the driver implies it may not be enabled or used in all Linux distributions or devices, limiting the scope somewhat. However, systems running this kernel version with the Meson VDEC driver enabled are vulnerable to local denial of service attacks through triggering the null pointer dereference in the video decoding subsystem.
Potential Impact
For European organizations, the primary impact of CVE-2022-3112 is the potential for local denial of service on Linux systems running kernel 5.16-rc6 with the Meson VDEC driver enabled. This could lead to system crashes or reboots, disrupting services that rely on these systems. Organizations using embedded Linux devices or multimedia systems based on the affected kernel version may experience operational interruptions. Since the vulnerability requires local access with low privileges, the risk is higher in environments where untrusted users or processes have local system access, such as multi-tenant servers, shared workstations, or devices exposed to less controlled user bases. The lack of impact on confidentiality or integrity reduces the risk of data breaches or unauthorized data modification. However, availability disruptions can affect critical infrastructure, especially in sectors relying on embedded Linux devices for media processing, such as telecommunications, broadcasting, or industrial control systems. Given the limited scope of affected kernel versions and the staging driver status, widespread impact is unlikely, but targeted attacks or accidental crashes could still pose operational challenges.
Mitigation Recommendations
1. Upgrade to a stable Linux kernel version beyond 5.16-rc6 where this vulnerability is patched or the affected driver is updated. Since 5.16-rc6 is a release candidate, stable releases should be preferred for production environments. 2. Audit systems to identify the presence and usage of the Meson VDEC driver; disable or blacklist the driver if it is not required to reduce the attack surface. 3. Restrict local access to trusted users only, employing strict access controls and user privilege management to prevent unprivileged users from exploiting this vulnerability. 4. Implement kernel hardening techniques such as kernel address space layout randomization (KASLR) and memory protection features to mitigate exploitation impact. 5. Monitor system logs and kernel crash reports for signs of null pointer dereference or unexpected reboots that could indicate exploitation attempts. 6. For embedded or specialized devices using this kernel version, coordinate with vendors for firmware or kernel updates addressing this issue. 7. Employ containerization or sandboxing to isolate processes that might trigger this vulnerability, limiting the scope of potential denial of service.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf7588
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 5:51:08 PM
Last updated: 7/31/2025, 8:25:12 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.