Skip to main content

CVE-2022-3113: CWE-476 in Kernel

Medium
VulnerabilityCVE-2022-3113cvecve-2022-3113cwe-476
Published: Wed Dec 14 2022 (12/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: Kernel

Description

An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.

AI-Powered Analysis

AILast updated: 06/21/2025, 17:37:23 UTC

Technical Analysis

CVE-2022-3113 is a medium-severity vulnerability identified in the Linux kernel version 5.16-rc6, specifically within the MediaTek video codec driver component (mtk_vcodec_fw_vpu.c). The issue arises due to the function mtk_vcodec_fw_vpu_init failing to check the return value of devm_kzalloc(), a kernel memory allocation function. When devm_kzalloc() fails, it returns a NULL pointer, and the absence of a check leads to a null pointer dereference (CWE-476). This dereference can cause a kernel crash (denial of service) by triggering a NULL pointer dereference in kernel space. The vulnerability requires local privileges (AV:L - local access vector) and low privileges (PR:L - low privileges) but does not require user interaction (UI:N). The impact is limited to availability (A:H), with no direct confidentiality or integrity impact. The vulnerability does not appear to have known exploits in the wild and affects a specific kernel release candidate version, which is not a stable release. The flaw is rooted in improper error handling in kernel memory allocation within a specific hardware driver, which could be triggered by a local attacker or process with limited privileges to cause a system crash or reboot, potentially disrupting services relying on the affected kernel version and hardware platform. No patch links were provided, but standard kernel update procedures would typically address this issue.

Potential Impact

For European organizations, the primary impact of CVE-2022-3113 is a potential denial of service on systems running the affected Linux kernel version 5.16-rc6 with MediaTek video codec hardware. This could disrupt critical services, especially in environments using MediaTek hardware for media processing or embedded systems. Although the vulnerability requires local access and low privileges, it could be exploited by malicious insiders or compromised local accounts to cause system instability or downtime. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions could affect operational continuity, particularly in sectors relying on Linux-based embedded devices or media processing servers. Since the affected kernel version is a release candidate and not a widely deployed stable release, the overall exposure is limited but still relevant for organizations using cutting-edge or custom Linux builds. The vulnerability's exploitation could impact service providers, telecommunications, and industrial control systems using MediaTek hardware in Europe, potentially leading to service interruptions or increased maintenance costs.

Mitigation Recommendations

Organizations should verify if their Linux systems are running kernel version 5.16-rc6 or similar release candidates with MediaTek video codec drivers. Immediate mitigation involves upgrading to a stable Linux kernel version where this issue is resolved or applying vendor-provided patches once available. For environments where upgrading is not immediately feasible, restricting local access to trusted users and processes can reduce exploitation risk. Additionally, monitoring system logs for kernel crashes or unusual behavior related to the mtk_vcodec_fw_vpu driver can help detect exploitation attempts. Implementing strict access controls and using security modules like SELinux or AppArmor to limit the capabilities of local users can further mitigate risk. For embedded or specialized devices, coordinate with hardware vendors for firmware and driver updates. Finally, maintain an inventory of devices using MediaTek hardware to prioritize patching and risk assessment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7613

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 5:37:23 PM

Last updated: 8/5/2025, 12:42:06 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats