CVE-2022-49163

In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: fix a bug of accessing array out of bounds When error occurs in parsing jpeg, the slot isn't acquired yet, it may be the default value MXC_MAX_SLOTS. If the driver access the slot using the incorrect slot number, it will access array out of bounds. The result is the driver will change num_domains, which follows slot_data in struct mxc_jpeg_dev. Then the driver won't detach the pm domain at rmmod, which will lead to kernel panic when trying to insmod again.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Sep 2025, 14:16

Type Values Removed Values Added
CWE CWE-125
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/02f9f97d54ffc85b50ad77f5b1f3c8f69cd17747 - () https://git.kernel.org/stable/c/02f9f97d54ffc85b50ad77f5b1f3c8f69cd17747 - Patch
References () https://git.kernel.org/stable/c/20c8b90430c5d6c4a3936eaa7c35aac670581487 - () https://git.kernel.org/stable/c/20c8b90430c5d6c4a3936eaa7c35aac670581487 - Patch
References () https://git.kernel.org/stable/c/97558d170a1236280407e8d29a7d095d2c2ed554 - () https://git.kernel.org/stable/c/97558d170a1236280407e8d29a7d095d2c2ed554 - Patch
References () https://git.kernel.org/stable/c/e209e6db2e527db6a93b14c2deedf969caca78fc - () https://git.kernel.org/stable/c/e209e6db2e527db6a93b14c2deedf969caca78fc - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: imx-jpeg: corrige un error de acceso a la matriz fuera de los límites Cuando ocurre un error al analizar jpeg, la ranura aún no se adquiere, puede ser el valor predeterminado MXC_MAX_SLOTS. Si el controlador accede a la ranura usando el número de ranura incorrecto, accederá a la matriz fuera de los límites. El resultado es que el controlador cambiará num_domains, que sigue a slot_data en struct mxc_jpeg_dev. Luego, el controlador no separará el dominio pm en rmmod, lo que provocará un pánico del kernel al intentar insmod nuevamente.

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-09-23 14:16


NVD link : CVE-2022-49163

Mitre link : CVE-2022-49163

CVE.ORG link : CVE-2022-49163


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read