Impact
In the Linux kernel's Qualcomm media subsystem, the vfe_isr() function iterates over seven image master indices but writes to a line array that is only sized for four elements. When the index reaches 4, 5, or 6, the code accesses memory beyond the bounds of vfe->line[], producing an out-of-bounds array access. This kernel memory corruption can potentially allow a local attacker to read or modify arbitrary kernel memory, leading to privilege escalation or system compromise.
Affected Systems
The flaw resides in the Linux kernel media driver for Qualcomm camera hardware (qcom camss vfe). Any Linux system that includes the affected kernel version and utilizes the Qualcomm Camera SubSystem driver is impacted. The announcement lists only the generic product 'Linux:Linux', and no specific kernel versions are supplied, so any kernel build containing the legacy vfe_isr_reg_update behaviour is vulnerable.
Risk and Exploitability
Because the vulnerability results in an out-of-bounds memory access within the kernel, it is classified as a potential kernel memory corruption flaw. The EPSS score of < 1% indicates a very low probability of exploitation, and the flaw is not yet listed in the CISA KEV catalog. The most likely attack vector is local privilege exploitation where a user with the ability to trigger the camera subsystem can invoke the faulty loop. The lack of a publicly known exploit and absence of a KEV flag suggest that the risk remains low to moderate pending patch deployment.
OpenCVE Enrichment