Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43142
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:27
Updated At-11 May, 2026 | 22:18
Rejected At-
▼CVE Numbering Authority (CNA)
media: iris: gen1: Destroy internal buffers after FW releases

In the Linux kernel, the following vulnerability has been resolved: media: iris: gen1: Destroy internal buffers after FW releases After the firmware releases internal buffers, the driver was not destroying them. This left stale allocations that were no longer used, especially across resolution changes where new buffers are allocated per the updated requirements. As a result, memory was wasted until session close. Destroy internal buffers once the release response is received from the firmware.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/platform/qcom/iris/iris_hfi_gen1_command.c
Default Status
unaffected
Versions
Affected
  • From 73702f45db81b74897b2808aaa13484826156006 before 7cde76db8883ec8a3d1456068079ecadbfb15ca5 (git)
  • From 73702f45db81b74897b2808aaa13484826156006 before d4457f23ac0130240053a34be663f0fade3bb371 (git)
  • From 73702f45db81b74897b2808aaa13484826156006 before 1dabf00ee206eceb0f08a1fe5d1ce635f9064338 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/platform/qcom/iris/iris_hfi_gen1_command.c
Default Status
affected
Versions
Affected
  • 6.15
Unaffected
  • From 0 before 6.15 (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/7cde76db8883ec8a3d1456068079ecadbfb15ca5
N/A
https://git.kernel.org/stable/c/d4457f23ac0130240053a34be663f0fade3bb371
N/A
https://git.kernel.org/stable/c/1dabf00ee206eceb0f08a1fe5d1ce635f9064338
N/A
Hyperlink: https://git.kernel.org/stable/c/7cde76db8883ec8a3d1456068079ecadbfb15ca5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d4457f23ac0130240053a34be663f0fade3bb371
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1dabf00ee206eceb0f08a1fe5d1ce635f9064338
Resource: N/A
Details not found