Description
In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: fix a bug of accessing array out of bounds When error occurs in parsing jpeg, the slot isn't acquired yet, it may be the default value MXC_MAX_SLOTS. If the driver access the slot using the incorrect slot number, it will access array out of bounds. The result is the driver will change num_domains, which follows slot_data in struct mxc_jpeg_dev. Then the driver won't detach the pm domain at rmmod, which will lead to kernel panic when trying to insmod again.
References (4)
Core 4
Core References
Scores
CVSS v3
7.1
EPSS
0.0007
EPSS Percentile
21.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (4)
linux/Kernel
5.13.0 - 5.15.33linux
linux/Kernel
5.16.0 - 5.16.19linux
linux/Kernel
5.17.0 - 5.17.2linux
linux/linux_kernel
5.13 - 5.15.33
Published
Feb 26, 2025
Tracked Since
Feb 18, 2026