CVE-2022-50383

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the MediaTek vcodec driver of the Linux kernel can cause kernel crashes when video decoding errors occur. This affects systems using MediaTek hardware video decoding with the affected driver. The vulnerability leads to denial of service but not arbitrary code execution.

💻 Affected Systems

Products:
  • Linux kernel with MediaTek vcodec driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with MediaTek hardware support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with MediaTek hardware using the vcodec driver for video decoding. Requires hardware video decoding to be enabled and used.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System crash/kernel panic leading to complete denial of service, requiring physical or remote console access to reboot.

🟠

Likely Case

Application crash or system instability when processing malformed video content with MediaTek hardware decoding.

🟢

If Mitigated

Minor performance impact from using software decoding fallback or avoiding affected hardware features.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger video decoding on target system.
🏢 Internal Only: MEDIUM - Could be triggered by users or applications processing video content internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to trigger video decoding errors on affected hardware. Likely requires local access or ability to feed malformed video to decoding applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 3568ecd3f3a6d133ab7feffbba34955c8c79bbc4, 66d26ed30056e7d2da3e9c14125ffe6049a4f907, or eeb090420f3477eb5011586709409fc655c2b16c applied

Vendor Advisory: https://git.kernel.org/stable/c/3568ecd3f3a6d133ab7feffbba34955c8c79bbc4

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. For custom kernels: Apply the relevant git commits and rebuild kernel.

🔧 Temporary Workarounds

Disable hardware video decoding

all

Configure applications to use software video decoding instead of MediaTek hardware acceleration

Application-specific configuration varies. For media players, set decoding method to software.

🧯 If You Can't Patch

  • Restrict video processing applications to trusted users only
  • Monitor systems for kernel crashes related to video decoding and investigate sources

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if MediaTek vcodec module is loaded: 'lsmod | grep mtk-vcodec' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits or check if patch is applied in kernel source

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • NULL pointer dereference errors in dmesg
  • Video application crashes

Network Indicators:

  • None - local vulnerability

SIEM Query:

Search for: 'kernel: BUG: unable to handle kernel NULL pointer dereference' AND 'mtk-vcodec' OR 'v4l2_m2m'

🔗 References

📤 Share & Export