CVE-2022-50786Linux vulnerability

7 documents6 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: media: s5p-mfc: Clear workbit to handle error condition During error on CLOSE_INSTANCE command, ctx_work_bits was not getting cleared. During consequent mfc execution NULL pointer dereferencing of this context led to kernel panic. This patch fixes this issue by making sure to clear ctx_work_bits always.

Affected Packages4 packages

Linuxlinux/linux_kernel3.16.04.19.270+5
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux818cd91ab8c6e42c2658c8e61f8462637c6f586b12242bd13ce68acd571b2cce6ab302e154e8a4ee+7
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
media: s5p-mfc: Clear workbit to handle error condition2025-12-30
GHSA
GHSA-p389-cvqc-hq98: In the Linux kernel, the following vulnerability has been resolved: media: s5p-mfc: Clear workbit to handle error condition During error on CLOSE_IN2025-12-30
OSV
CVE-2022-50786: In the Linux kernel, the following vulnerability has been resolved: media: s5p-mfc: Clear workbit to handle error condition During error on CLOSE_INST2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: media: s5p-mfc: Clear workbit to handle error condition2025-12-30
Debian
CVE-2022-50786: linux - In the Linux kernel, the following vulnerability has been resolved: media: s5p-...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50786 Impact, Exploitability, and Mitigation Steps | Wiz