{"id":"CVE-2022-49163","summary":"media: imx-jpeg: fix a bug of accessing array out of bounds","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imx-jpeg: fix a bug of accessing array out of bounds\n\nWhen error occurs in parsing jpeg, the slot isn't acquired yet, it may\nbe the default value MXC_MAX_SLOTS.\nIf the driver access the slot using the incorrect slot number, it will\naccess array out of bounds.\nThe result is the driver will change num_domains, which follows\nslot_data in struct mxc_jpeg_dev.\nThen the driver won't detach the pm domain at rmmod, which will lead to\nkernel panic when trying to insmod again.","modified":"2026-04-11T12:43:39.880970Z","published":"2025-02-26T01:55:24.043Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1241-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49163.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/02f9f97d54ffc85b50ad77f5b1f3c8f69cd17747"},{"type":"WEB","url":"https://git.kernel.org/stable/c/20c8b90430c5d6c4a3936eaa7c35aac670581487"},{"type":"WEB","url":"https://git.kernel.org/stable/c/97558d170a1236280407e8d29a7d095d2c2ed554"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e209e6db2e527db6a93b14c2deedf969caca78fc"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49163.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49163"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2db16c6ed72ce644d5639b3ed15e5817442db4ba"},{"fixed":"02f9f97d54ffc85b50ad77f5b1f3c8f69cd17747"},{"fixed":"20c8b90430c5d6c4a3936eaa7c35aac670581487"},{"fixed":"e209e6db2e527db6a93b14c2deedf969caca78fc"},{"fixed":"97558d170a1236280407e8d29a7d095d2c2ed554"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49163.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.13.0"},{"fixed":"5.15.33"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.16.19"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.17.0"},{"fixed":"5.17.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49163.json"}}],"schema_version":"1.7.5"}