« List of all CVEs

CVE-2026-43142

media: iris: gen1: Destroy internal buffers after FW releases

Published: 5/6/2026 Last updated: 5/11/2026 Reserved: 5/1/2026

In the Linux kernel, the following vulnerability has been resolved: media: iris: gen1: Destroy internal buffers after FW releases After the firmware releases internal buffers, the driver was not destroying them. This left stale allocations that were no longer used, especially across resolution changes where new buffers are allocated per the updated requirements. As a result, memory was wasted until session close. Destroy internal buffers once the release response is received from the firmware.

CNA assigner: Linux (416baaa9-dc9f-4396-8d5f-8c081fb06d67) Requested by: n/a

Opam packages affected (29)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes ortools_solvers orun rawlink rawlink-eio rawlink-lwt restricted shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (4)

Product Vendor Version
Linux Linux 15.2(4)S3
Linux Linux 15.2(4)S3a
Linux Linux Windows 10 Version 1803 for x64-based Systems
Linux Linux Service Pack 2 on Windows Server 2008 for Itanium-Based Systems Service Pack 2

References (6)