CVE-2022-3113: CWE-476 in Kernel
An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.
AI Analysis
Technical Summary
CVE-2022-3113 is a medium-severity vulnerability identified in the Linux kernel version 5.16-rc6, specifically within the MediaTek video codec driver component (mtk_vcodec_fw_vpu.c). The issue arises due to the function mtk_vcodec_fw_vpu_init failing to check the return value of devm_kzalloc(), a kernel memory allocation function. When devm_kzalloc() fails, it returns a NULL pointer, and the absence of a check leads to a null pointer dereference (CWE-476). This dereference can cause a kernel crash (denial of service) by triggering a NULL pointer dereference in kernel space. The vulnerability requires local privileges (AV:L - local access vector) and low privileges (PR:L - low privileges) but does not require user interaction (UI:N). The impact is limited to availability (A:H), with no direct confidentiality or integrity impact. The vulnerability does not appear to have known exploits in the wild and affects a specific kernel release candidate version, which is not a stable release. The flaw is rooted in improper error handling in kernel memory allocation within a specific hardware driver, which could be triggered by a local attacker or process with limited privileges to cause a system crash or reboot, potentially disrupting services relying on the affected kernel version and hardware platform. No patch links were provided, but standard kernel update procedures would typically address this issue.
Potential Impact
For European organizations, the primary impact of CVE-2022-3113 is a potential denial of service on systems running the affected Linux kernel version 5.16-rc6 with MediaTek video codec hardware. This could disrupt critical services, especially in environments using MediaTek hardware for media processing or embedded systems. Although the vulnerability requires local access and low privileges, it could be exploited by malicious insiders or compromised local accounts to cause system instability or downtime. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions could affect operational continuity, particularly in sectors relying on Linux-based embedded devices or media processing servers. Since the affected kernel version is a release candidate and not a widely deployed stable release, the overall exposure is limited but still relevant for organizations using cutting-edge or custom Linux builds. The vulnerability's exploitation could impact service providers, telecommunications, and industrial control systems using MediaTek hardware in Europe, potentially leading to service interruptions or increased maintenance costs.
Mitigation Recommendations
Organizations should verify if their Linux systems are running kernel version 5.16-rc6 or similar release candidates with MediaTek video codec drivers. Immediate mitigation involves upgrading to a stable Linux kernel version where this issue is resolved or applying vendor-provided patches once available. For environments where upgrading is not immediately feasible, restricting local access to trusted users and processes can reduce exploitation risk. Additionally, monitoring system logs for kernel crashes or unusual behavior related to the mtk_vcodec_fw_vpu driver can help detect exploitation attempts. Implementing strict access controls and using security modules like SELinux or AppArmor to limit the capabilities of local users can further mitigate risk. For embedded or specialized devices, coordinate with hardware vendors for firmware and driver updates. Finally, maintain an inventory of devices using MediaTek hardware to prioritize patching and risk assessment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-3113: CWE-476 in Kernel
Description
An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.
AI-Powered Analysis
Technical Analysis
CVE-2022-3113 is a medium-severity vulnerability identified in the Linux kernel version 5.16-rc6, specifically within the MediaTek video codec driver component (mtk_vcodec_fw_vpu.c). The issue arises due to the function mtk_vcodec_fw_vpu_init failing to check the return value of devm_kzalloc(), a kernel memory allocation function. When devm_kzalloc() fails, it returns a NULL pointer, and the absence of a check leads to a null pointer dereference (CWE-476). This dereference can cause a kernel crash (denial of service) by triggering a NULL pointer dereference in kernel space. The vulnerability requires local privileges (AV:L - local access vector) and low privileges (PR:L - low privileges) but does not require user interaction (UI:N). The impact is limited to availability (A:H), with no direct confidentiality or integrity impact. The vulnerability does not appear to have known exploits in the wild and affects a specific kernel release candidate version, which is not a stable release. The flaw is rooted in improper error handling in kernel memory allocation within a specific hardware driver, which could be triggered by a local attacker or process with limited privileges to cause a system crash or reboot, potentially disrupting services relying on the affected kernel version and hardware platform. No patch links were provided, but standard kernel update procedures would typically address this issue.
Potential Impact
For European organizations, the primary impact of CVE-2022-3113 is a potential denial of service on systems running the affected Linux kernel version 5.16-rc6 with MediaTek video codec hardware. This could disrupt critical services, especially in environments using MediaTek hardware for media processing or embedded systems. Although the vulnerability requires local access and low privileges, it could be exploited by malicious insiders or compromised local accounts to cause system instability or downtime. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions could affect operational continuity, particularly in sectors relying on Linux-based embedded devices or media processing servers. Since the affected kernel version is a release candidate and not a widely deployed stable release, the overall exposure is limited but still relevant for organizations using cutting-edge or custom Linux builds. The vulnerability's exploitation could impact service providers, telecommunications, and industrial control systems using MediaTek hardware in Europe, potentially leading to service interruptions or increased maintenance costs.
Mitigation Recommendations
Organizations should verify if their Linux systems are running kernel version 5.16-rc6 or similar release candidates with MediaTek video codec drivers. Immediate mitigation involves upgrading to a stable Linux kernel version where this issue is resolved or applying vendor-provided patches once available. For environments where upgrading is not immediately feasible, restricting local access to trusted users and processes can reduce exploitation risk. Additionally, monitoring system logs for kernel crashes or unusual behavior related to the mtk_vcodec_fw_vpu driver can help detect exploitation attempts. Implementing strict access controls and using security modules like SELinux or AppArmor to limit the capabilities of local users can further mitigate risk. For embedded or specialized devices, coordinate with hardware vendors for firmware and driver updates. Finally, maintain an inventory of devices using MediaTek hardware to prioritize patching and risk assessment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf7613
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 5:37:23 PM
Last updated: 8/5/2025, 12:42:06 PM
Views: 12
Related Threats
CVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighCVE-2025-40766: CWE-400: Uncontrolled Resource Consumption in Siemens SINEC Traffic Analyzer
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.