Impact
The imx_rproc driver contains a check that identifies a resource table present in firmware, but the function can mistakenly return a non‑NULL pointer when no table exists. The remoteproc core treats a non‑NULL value as evidence that a table is loaded and later dereferences it. Because the actual pointer is NULL, a crash occurs when the device starts executing firmware lacking a resource table. This crash stops the affected device or system from functioning until it is rebooted or the firmware is replaced, resulting in a denial of service.
Affected Systems
All Linux kernel builds that ship the imx_rproc driver in the remoteproc subsystem are affected. No particular release series is listed, so any kernel that has not incorporated commit 198c629bd03863591f3fbf5ce8ff974a33f13dc9 (or a functionally equivalent fix) remains vulnerable. The affected vendor is Linux. The vulnerability manifests when a device tree contains a "rsc-table" entry while the firmware image loaded through remoteproc does not provide a resource table.
Risk and Exploitability
The CVSS score is not provided; the EPSS score is unavailable, and the vulnerability does not appear in the CISA KEV catalog. Exploitation requires an attacker who can deliver or modify the firmware image used by the remoteproc driver, or who can alter the device tree so that it declares a resource table when none exists. The likely attack vector is inferred from the description, suggesting that either firmware replacement or device tree manipulation by a privileged or local adversary is necessary. Because the flaw causes an unconditional driver crash, the impact is a denial of service that afflicts the entire device. The risk is high, although the likelihood of exploitation is limited to environments where firmware or device tree manipulation is possible.
OpenCVE Enrichment