CVE-2026-43145 PUBLISHED

remoteproc: imx_rproc: Fix invalid loaded resource table detection

Assigner: Linux
Reserved: 01.05.2026 Published: 06.05.2026 Updated: 06.05.2026

In the Linux kernel, the following vulnerability has been resolved:

remoteproc: imx_rproc: Fix invalid loaded resource table detection

imx_rproc_elf_find_loaded_rsc_table() may incorrectly report a loaded resource table even when the current firmware does not provide one.

When the device tree contains a "rsc-table" entry, priv->rsc_table is non-NULL and denotes where a resource table would be located if one is present in memory. However, when the current firmware has no resource table, rproc->table_ptr is NULL. The function still returns priv->rsc_table, and the remoteproc core interprets this as a valid loaded resource table.

Fix this by returning NULL from imx_rproc_elf_find_loaded_rsc_table() when there is no resource table for the current firmware (i.e. when rproc->table_ptr is NULL). This aligns the function's semantics with the remoteproc core: a loaded resource table is only reported when a valid table_ptr exists.

With this change, starting firmware without a resource table no longer triggers a crash.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 64f2ca5ce97111a364a18c31772eb46c79e8b772 to 91baf24d972ea3c04a75dd18821c03d223c0dbc0 (excl.)
  • affected from 1d750606fedcdff7886f35a558c51b05ce2680a6 to fcec79b6a3649ae7b1f659267602ca402c240d6e (excl.)
  • affected from 7fb5f957213bc7268bac449f8bfe95967c9f3f3b to 9bd98d088f47153a81a6ec8162b4415c64aa7f39 (excl.)
  • affected from e954a1bd16102abc800629f9900715d8ec4c3130 to 65379adf7d231c930572db45933ff4538f4c5128 (excl.)
  • affected from e954a1bd16102abc800629f9900715d8ec4c3130 to 500778df9e4c313190368908ff40c23948508e97 (excl.)
  • affected from e954a1bd16102abc800629f9900715d8ec4c3130 to 198c629bd03863591f3fbf5ce8ff974a33f13dc9 (excl.)
  • affected from e954a1bd16102abc800629f9900715d8ec4c3130 to 26aa5295010ffaebcf8f1991c53fa7cf2ee1b20d (excl.)
  • Version 3d131f138e092c414c69860f2c897c59d660da99 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.12 is affected
  • unaffected from 0 to 6.12 (excl.)
  • unaffected from 5.15.202 to 5.15.* (incl.)
  • unaffected from 6.1.165 to 6.1.* (incl.)
  • unaffected from 6.6.128 to 6.6.* (incl.)
  • unaffected from 6.12.75 to 6.12.* (incl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References