Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43189
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:27
Updated At-11 May, 2026 | 22:19
Rejected At-
▼CVE Numbering Authority (CNA)
media: v4l2-async: Fix error handling on steps after finding a match

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-async: Fix error handling on steps after finding a match Once an async connection is found to be matching with an fwnode, a sub-device may be registered (in case it wasn't already), its bound operation is called, ancillary links are created, the async connection is added to the sub-device's list of connections and removed from the global waiting connection list. Further on, the sub-device's possible own notifier is searched for possible additional matches. Fix these specific issues: - If v4l2_async_match_notify() failed before the sub-notifier handling, the async connection was unbound and its entry removed from the sub-device's async connection list. The latter part was also done in v4l2_async_match_notify(). - The async connection's sd field was only set after creating ancillary links in v4l2_async_match_notify(). It was however dereferenced in v4l2_async_unbind_subdev_one(), which was called on error path of v4l2_async_match_notify() failure.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/v4l2-core/v4l2-async.c
Default Status
unaffected
Versions
Affected
  • From 28a1295795d85a25f2e7dd391c43969e95fcb341 before 30aaed311f973f13ba13a0cd2dc0202f595fff48 (git)
  • From 28a1295795d85a25f2e7dd391c43969e95fcb341 before 461733d83e67ba7e3a5b750c0d203f738e01244f (git)
  • From 28a1295795d85a25f2e7dd391c43969e95fcb341 before b02bcb378efa8af07827f49b3afcc5e825318c55 (git)
  • From 28a1295795d85a25f2e7dd391c43969e95fcb341 before 2de0a3c8148fc3dbea21981e6569f550b3626119 (git)
  • From 28a1295795d85a25f2e7dd391c43969e95fcb341 before 7345d6d356336c448d6b9230ed8704f39679fd12 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/media/v4l2-core/v4l2-async.c
Default Status
affected
Versions
Affected
  • 6.6
Unaffected
  • From 0 before 6.6 (semver)
  • From 6.6.128 through 6.6.* (semver)
  • From 6.12.75 through 6.12.* (semver)
  • From 6.18.16 through 6.18.* (semver)
  • From 6.19.6 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/30aaed311f973f13ba13a0cd2dc0202f595fff48
N/A
https://git.kernel.org/stable/c/461733d83e67ba7e3a5b750c0d203f738e01244f
N/A
https://git.kernel.org/stable/c/b02bcb378efa8af07827f49b3afcc5e825318c55
N/A
https://git.kernel.org/stable/c/2de0a3c8148fc3dbea21981e6569f550b3626119
N/A
https://git.kernel.org/stable/c/7345d6d356336c448d6b9230ed8704f39679fd12
N/A
Hyperlink: https://git.kernel.org/stable/c/30aaed311f973f13ba13a0cd2dc0202f595fff48
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/461733d83e67ba7e3a5b750c0d203f738e01244f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b02bcb378efa8af07827f49b3afcc5e825318c55
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2de0a3c8148fc3dbea21981e6569f550b3626119
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7345d6d356336c448d6b9230ed8704f39679fd12
Resource: N/A
Details not found