CVE-2026-43222
Buffer Overflow in Linux Kernel AV1 Decoder
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| verisilicon | av1 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's handling of the Verisilicon AV1 media component. Specifically, it involves the incorrect allocation of memory for the tile info buffer. Each tile info consists of four 4-byte fields (row_sb, col_sb, start_pos, and end_pos), requiring a total memory size of AV1_MAX_TILES multiplied by 16 bytes. The vulnerability occurred because the buffer was not allocated using the correct size defined by the appropriate #define, which could lead to writing tile info data into memory that was not properly allocated.
How can this vulnerability impact me? :
The impact of this vulnerability could include memory corruption due to writing beyond the allocated buffer size. This may lead to system instability, crashes, or potentially exploitable conditions depending on how the corrupted memory is used. However, specific impacts such as privilege escalation or data leakage are not detailed in the provided information.