Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43222
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:28
Updated At-08 May, 2026 | 12:41
Rejected At-
▼CVE Numbering Authority (CNA)
media: verisilicon: AV1: Fix tile info buffer size

In the Linux kernel, the following vulnerability has been resolved: media: verisilicon: AV1: Fix tile info buffer size Each tile info is composed of: row_sb, col_sb, start_pos and end_pos (4 bytes each). So the total required memory is AV1_MAX_TILES * 16 bytes. Use the correct #define to allocate the buffer and avoid writing tile info in non-allocated memory.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/platform/verisilicon/rockchip_vpu981_hw_av1_dec.c
Default Status
unaffected
Versions
Affected
  • From 727a400686a2c0d25015c9e44916a59b72882f83 before a5b1ddbe31f49b4da78642157589970e9b60a231 (git)
  • From 727a400686a2c0d25015c9e44916a59b72882f83 before 34f36f9c6114af781a5a4f7a7c99334c85b73fc7 (git)
  • From 727a400686a2c0d25015c9e44916a59b72882f83 before f122f2b3ce9dbde60bf7ab0b180fe4a01f9d9bc4 (git)
  • From 727a400686a2c0d25015c9e44916a59b72882f83 before 74abfadd7ef5ac9f3a6111d550cc651d1457c641 (git)
  • From 727a400686a2c0d25015c9e44916a59b72882f83 before a505ca2db89ad92a8d8d27fa68ebafb12e04a679 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/platform/verisilicon/rockchip_vpu981_hw_av1_dec.c
Default Status
affected
Versions
Affected
  • 6.5
Unaffected
  • From 0 before 6.5 (semver)
  • From 6.6.128 through 6.6.* (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a5b1ddbe31f49b4da78642157589970e9b60a231
N/A
https://git.kernel.org/stable/c/34f36f9c6114af781a5a4f7a7c99334c85b73fc7
N/A
https://git.kernel.org/stable/c/f122f2b3ce9dbde60bf7ab0b180fe4a01f9d9bc4
N/A
https://git.kernel.org/stable/c/74abfadd7ef5ac9f3a6111d550cc651d1457c641
N/A
https://git.kernel.org/stable/c/a505ca2db89ad92a8d8d27fa68ebafb12e04a679
N/A
Hyperlink: https://git.kernel.org/stable/c/a5b1ddbe31f49b4da78642157589970e9b60a231
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/34f36f9c6114af781a5a4f7a7c99334c85b73fc7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f122f2b3ce9dbde60bf7ab0b180fe4a01f9d9bc4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/74abfadd7ef5ac9f3a6111d550cc651d1457c641
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a505ca2db89ad92a8d8d27fa68ebafb12e04a679
Resource: N/A
Details not found