CVE-2022-50786
Description
In the Linux kernel, the following vulnerability has been resolved:
media: s5p-mfc: Clear workbit to handle error condition
During error on CLOSE_INSTANCE command, ctx_work_bits was not getting cleared. During consequent mfc execution NULL pointer dereferencing of this context led to kernel panic. This patch fixes this issue by making sure to clear ctx_work_bits always.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's s5p-mfc driver, an error during CLOSE_INSTANCE leaves ctx_work_bits set, leading to a NULL pointer dereference and kernel panic.
Root
Cause
In the Linux kernel's s5p-mfc (Samsung Multi Format Codec ) driver, when a CLOSE_INSTANCE command fails, the ctx_work_bits flag was not cleared. This oversight means that the driver's work queue still believes the context has pending work, even though the context itself may have been freed or invalidated [1][2].
Exploitation
An attacker with the ability to trigger a CLOSE_INSTANCE error on a vulnerable system can cause the driver to later attempt to process work on a stale or freed context. No special privileges beyond local access to the media device are required; the attack surface is the MFC device interface exposed to user space [3][4].
Impact
When the driver subsequently tries to execute work for the un-cleared context, it dereferences a NULL pointer, resulting in a kernel panic. This constitutes a denial-of-service condition can crash the entire system, making it unavailable until reboot [1][4].
Mitigation
The fix, already merged into the stable kernel tree, ensures that ctx_work_bits is always cleared, even on error paths. Users should apply the latest kernel updates from their distribution or directly cherry-pick the commit [2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
712242bd13ce6640075400c7c8ff64edf9d16ff27800c0a6d09c1fbbe5327bd1b72f0c39ad3f3c2fe54e3Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/09c1fbbe532758e4046c20829f4c0c50b99332dcnvd
- git.kernel.org/stable/c/12242bd13ce68acd571b2cce6ab302e154e8a4eenvd
- git.kernel.org/stable/c/640075400c7c577b0f5369b935e22a588773fafanvd
- git.kernel.org/stable/c/8ff64edf9d16e8c277dcc8189794763624e6b4b8nvd
- git.kernel.org/stable/c/bd1b72f0c39a0d791a087b4e643701a48328ba8envd
- git.kernel.org/stable/c/d3f3c2fe54e30b0636496d842ffbb5ad3a547f9bnvd
- git.kernel.org/stable/c/ff27800c0a6d81571671b33f696109804d015409nvd
News mentions
0No linked articles in our index yet.