In the Linux kernel, the following vulnerability has been resolved:
media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers
If the application queues an NV12M jpeg as output buffer, but then queues a single planar capture buffer, the kernel will crash with "Unable to handle kernel NULL pointer dereference" in mxcjpegaddrs, prevent this by finishing the job with error.
[
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"252528488853539106830227610913821176844",
"171201050469806862234841788279772573120",
"17209967971497741243074301531456865791",
"240150130930681787536681249341438588230"
],
"threshold": 0.9
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eff76b180751e5e55c872d17755680c3b83ba9ab",
"signature_version": "v1",
"id": "CVE-2022-49165-3b1468f8"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"252528488853539106830227610913821176844",
"171201050469806862234841788279772573120",
"17209967971497741243074301531456865791",
"240150130930681787536681249341438588230"
],
"threshold": 0.9
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8d075ede7d24f19dc817c5bd517a53f0524f9031",
"signature_version": "v1",
"id": "CVE-2022-49165-46766693"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1981.0,
"function_hash": "190101607810999269350333079063673959655"
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c",
"function": "mxc_jpeg_device_run"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4eb591c47c82a6a6ad293ed108c3cb77115fbc25",
"signature_version": "v1",
"id": "CVE-2022-49165-639f2f4b"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1981.0,
"function_hash": "190101607810999269350333079063673959655"
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c",
"function": "mxc_jpeg_device_run"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@417591a766b3c040c346044541ff949c0b2bb7b2",
"signature_version": "v1",
"id": "CVE-2022-49165-7e1c003d"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2000.0,
"function_hash": "133532940290975892816596486296123733581"
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c",
"function": "mxc_jpeg_device_run"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eff76b180751e5e55c872d17755680c3b83ba9ab",
"signature_version": "v1",
"id": "CVE-2022-49165-8bb2ee27"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"252528488853539106830227610913821176844",
"171201050469806862234841788279772573120",
"17209967971497741243074301531456865791",
"240150130930681787536681249341438588230"
],
"threshold": 0.9
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@417591a766b3c040c346044541ff949c0b2bb7b2",
"signature_version": "v1",
"id": "CVE-2022-49165-9c02cf51"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1981.0,
"function_hash": "190101607810999269350333079063673959655"
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c",
"function": "mxc_jpeg_device_run"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8d075ede7d24f19dc817c5bd517a53f0524f9031",
"signature_version": "v1",
"id": "CVE-2022-49165-a0052b9f"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"252528488853539106830227610913821176844",
"171201050469806862234841788279772573120",
"17209967971497741243074301531456865791",
"240150130930681787536681249341438588230"
],
"threshold": 0.9
},
"target": {
"file": "drivers/media/platform/imx-jpeg/mxc-jpeg.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4eb591c47c82a6a6ad293ed108c3cb77115fbc25",
"signature_version": "v1",
"id": "CVE-2022-49165-acdf202b"
}
]