CVE-2022-50399

5.5 MEDIUM

📋 TL;DR

This CVE describes an integer overflow vulnerability in the Linux kernel's atomisp media driver. When processing user-supplied height and width values in the sh_css_set_black_frame() function, multiplication can overflow, potentially leading to memory corruption. This affects Linux systems with the atomisp driver enabled, typically on devices with Intel Atom image signal processors.

💻 Affected Systems

Products:
  • Linux kernel with atomisp driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if the atomisp driver is enabled and loaded. This driver is typically used on devices with Intel Atom image signal processors for camera/media processing.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory corruption leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System crash or denial of service when processing malformed media input through the atomisp driver.

🟢

If Mitigated

No impact if the atomisp driver is not loaded or if input validation prevents overflow.

🌐 Internet-Facing: LOW - This requires local access or ability to trigger media processing through the kernel driver.
🏢 Internal Only: MEDIUM - Local users or processes could potentially trigger this vulnerability to cause system instability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger the vulnerable function with controlled input, typically through media processing operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel versions containing commits: 3ad290194bb06979367622e47357462836c1d3b4, 51b8dc5163d2ff2bf04019f8bf7e3bd0e75bb654, a549517e4b761f3940011db30320cb8c9badde54, a560aeac2f2d284903b5900774765d7fc61547bc

Vendor Advisory: https://git.kernel.org/stable/c/3ad290194bb06979367622e47357462836c1d3b4

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution. 2. Reboot system to load new kernel. 3. Verify atomisp driver is updated.

🔧 Temporary Workarounds

Disable atomisp driver

Linux

Prevent loading of the vulnerable atomisp driver module

echo 'blacklist atomisp' >> /etc/modprobe.d/blacklist-atomisp.conf
rmmod atomisp

🧯 If You Can't Patch

  • Disable or unload the atomisp kernel module if not required
  • Implement strict input validation for media processing applications that use the atomisp driver

🔍 How to Verify

Check if Vulnerable:

Check if atomisp module is loaded: lsmod | grep atomisp. Check kernel version: uname -r and compare with patched versions from your distribution.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to patched version and atomisp module version matches patched kernel.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • System crash dumps
  • Atomisp driver error messages in dmesg

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

Search for kernel panic events or atomisp driver crashes in system logs

🔗 References

📤 Share & Export