CVE-2025-39712

5.5 MEDIUM

📋 TL;DR

A deadlock vulnerability in the Linux kernel's mt9m114 camera sensor driver causes system hangs when frame interval operations are performed. This affects Linux systems using the mt9m114 camera sensor driver, potentially impacting embedded devices, IoT cameras, and systems with this specific hardware.

💻 Affected Systems

Products:
  • Linux kernel with mt9m114 camera sensor driver
Versions: Linux kernel versions containing the vulnerable mt9m114 driver code prior to fixes
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with mt9m114 camera hardware and driver loaded. The vulnerability is triggered when using V4L2 subdev pad operations get_frame_interval/set_frame_interval.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system deadlock requiring hard reboot, causing denial of service and potential data loss in critical systems.

🟠

Likely Case

System hangs or freezes when camera frame interval operations are attempted, requiring manual intervention to restore functionality.

🟢

If Mitigated

Minor performance impact or failed camera operations without system-wide disruption.

🌐 Internet-Facing: LOW - Requires local access to camera hardware and specific driver operations.
🏢 Internal Only: MEDIUM - Could affect embedded systems and IoT devices using this specific camera sensor.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to camera hardware and ability to trigger specific V4L2 operations. Not remotely exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 0d23b548d71e5d76955fdf1d73addd8f6494f602, 298d1471cf83d5a2a05970e41822a2403f451086, or 41b97490a1656bdc7038d6345a84b08d45deafc6

Vendor Advisory: https://git.kernel.org/stable/c/0d23b548d71e5d76955fdf1d73addd8f6494f602

Restart Required: No

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For embedded systems: Rebuild kernel with patched driver. 3. For distributions: Apply security updates from your vendor. 4. No kernel reboot required if using module unloading/reloading.

🔧 Temporary Workarounds

Disable mt9m114 driver

all

Prevent loading of the vulnerable driver if camera functionality is not required

echo 'blacklist mt9m114' >> /etc/modprobe.d/blacklist.conf
rmmod mt9m114

Avoid frame interval operations

all

Prevent applications from calling get_frame_interval/set_frame_interval on mt9m114 devices

🧯 If You Can't Patch

  • Monitor system for hangs and implement automatic recovery mechanisms
  • Isolate affected systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check if mt9m114 driver is loaded: lsmod | grep mt9m114. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel includes fix commits: git log --oneline | grep -E '0d23b548d71e|298d1471cf83|41b97490a165'. Test camera frame interval operations.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System hang/freeze events
  • Camera driver timeout errors in dmesg

Network Indicators:

  • None - local hardware vulnerability

SIEM Query:

source="kernel" AND ("mt9m114" OR "deadlock" OR "frame_interval")

🔗 References

📤 Share & Export