remoteproc: imx_rproc: Fix invalid loaded resource table detection
Summary
| CVE | CVE-2026-43145 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 12:16:31 UTC |
| Updated | 2026-05-06 13:07:51 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
remoteproc: imx_rproc: Fix invalid loaded resource table detection
imx_rproc_elf_find_loaded_rsc_table() may incorrectly report a loaded
resource table even when the current firmware does not provide one.
When the device tree contains a "rsc-table" entry, priv->rsc_table is
non-NULL and denotes where a resource table would be located if one is
present in memory. However, when the current firmware has no resource
table, rproc->table_ptr is NULL. The function still returns
priv->rsc_table, and the remoteproc core interprets this as a valid loaded
resource table.
Fix this by returning NULL from imx_rproc_elf_find_loaded_rsc_table() when
there is no resource table for the current firmware (i.e. when
rproc->table_ptr is NULL). This aligns the function's semantics with the
remoteproc core: a loaded resource table is only reported when a valid
table_ptr exists.
With this change, starting firmware without a resource table no longer
triggers a crash. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 64f2ca5ce97111a364a18c31772eb46c79e8b772 91baf24d972ea3c04a75dd18821c03d223c0dbc0 git |
Not specified |
| CNA |
Linux |
Linux |
affected 1d750606fedcdff7886f35a558c51b05ce2680a6 fcec79b6a3649ae7b1f659267602ca402c240d6e git |
Not specified |
| CNA |
Linux |
Linux |
affected 7fb5f957213bc7268bac449f8bfe95967c9f3f3b 9bd98d088f47153a81a6ec8162b4415c64aa7f39 git |
Not specified |
| CNA |
Linux |
Linux |
affected e954a1bd16102abc800629f9900715d8ec4c3130 65379adf7d231c930572db45933ff4538f4c5128 git |
Not specified |
| CNA |
Linux |
Linux |
affected e954a1bd16102abc800629f9900715d8ec4c3130 500778df9e4c313190368908ff40c23948508e97 git |
Not specified |
| CNA |
Linux |
Linux |
affected e954a1bd16102abc800629f9900715d8ec4c3130 198c629bd03863591f3fbf5ce8ff974a33f13dc9 git |
Not specified |
| CNA |
Linux |
Linux |
affected e954a1bd16102abc800629f9900715d8ec4c3130 26aa5295010ffaebcf8f1991c53fa7cf2ee1b20d git |
Not specified |
| CNA |
Linux |
Linux |
affected 3d131f138e092c414c69860f2c897c59d660da99 git |
Not specified |
| CNA |
Linux |
Linux |
affected 6.12 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.202 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.165 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.128 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.75 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.16 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.6 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/91baf24d972ea3c04a75dd18821c03d223c0dbc0 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/9bd98d088f47153a81a6ec8162b4415c64aa7f39 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/26aa5295010ffaebcf8f1991c53fa7cf2ee1b20d |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/500778df9e4c313190368908ff40c23948508e97 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/65379adf7d231c930572db45933ff4538f4c5128 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/fcec79b6a3649ae7b1f659267602ca402c240d6e |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/198c629bd03863591f3fbf5ce8ff974a33f13dc9 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.