Impact
A use‑after‑free flaw in the MediaTek Vcodec driver’s release path allows the kernel workqueue handler to access freed context memory. The defect arises when the release routine frees the context structure without canceling or synchronizing any pending work, creating a data‑race condition. If exploited, this can corrupt kernel memory, potentially leading to privilege escalation, arbitrary code execution, or service disruption. The vulnerability is categorized under CWE‑416 (Use After Free) and CWE‑825 (Race Condition).
Affected Systems
All Linux kernel releases that include the MediaTek Vcodec driver and have not applied the recent patch. The flaw resides in drivers/media/v4l2-core/mtk_vcodec related code and affects systems using the Mediatek video encoder driver across current kernel versions.
Risk and Exploitability
The flaw carries a CVSS score of 7.8, indicating high impact. EPSS indicates a very low, but non‑zero, likelihood of exploitation (<1 %). The vulnerability is not listed in CISA’s KEV catalogue. Exploitation would likely require local or privileged access to orchestrate concurrent open and release operations on the device to trigger the race window. The attack surface is thus limited, but the severity remains significant if the conditions are met.
OpenCVE Enrichment
Debian DSA