{ "schema_version": "1.4.0", "id": "GHSA-4rpj-c283-5mg3", "modified": "2025-09-23T15:31:07Z", "published": "2025-09-23T15:31:07Z", "aliases": [ "CVE-2022-49163" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imx-jpeg: fix a bug of accessing array out of bounds\n\nWhen error occurs in parsing jpeg, the slot isn't acquired yet, it may\nbe the default value MXC_MAX_SLOTS.\nIf the driver access the slot using the incorrect slot number, it will\naccess array out of bounds.\nThe result is the driver will change num_domains, which follows\nslot_data in struct mxc_jpeg_dev.\nThen the driver won't detach the pm domain at rmmod, which will lead to\nkernel panic when trying to insmod again.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49163" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/02f9f97d54ffc85b50ad77f5b1f3c8f69cd17747" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/20c8b90430c5d6c4a3936eaa7c35aac670581487" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/97558d170a1236280407e8d29a7d095d2c2ed554" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/e209e6db2e527db6a93b14c2deedf969caca78fc" } ], "database_specific": { "cwe_ids": [ "CWE-125" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-02-26T07:00:53Z" } }