CVE-2026-43151 (GCVE-0-2026-43151)
Vulnerability from cvelistv5 – Published: 2026-05-06 11:27 – Updated: 2026-05-06 11:27
VLAI?
Title
Revert "media: iris: Add sanity check for stop streaming"
Summary
In the Linux kernel, the following vulnerability has been resolved:
Revert "media: iris: Add sanity check for stop streaming"
This reverts commit ad699fa78b59241c9d71a8cafb51525f3dab04d4.
Revert the check that skipped stop_streaming when the instance was in
IRIS_INST_ERROR, as it caused multiple regressions:
1. Buffers were not returned to vb2 when the instance was already in
error state, triggering warnings in the vb2 core because buffer
completion was skipped.
2. If a session failed early (e.g. unsupported configuration), the
instance transitioned to IRIS_INST_ERROR. When userspace attempted
to stop streaming for cleanup, stop_streaming was skipped due to the
added check, preventing proper teardown and leaving the firmware
in an inconsistent state.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
f8b136296722e258ec43237a35f72c92a6d4501a , < bd4f8fa216182f33c06d4c1e162975a0c42fb14e
(git)
Affected: ad699fa78b59241c9d71a8cafb51525f3dab04d4 , < a58b9d1c1cf81c0b29f1983c63c3e0c0caa68398 (git) Affected: ad699fa78b59241c9d71a8cafb51525f3dab04d4 , < 370e19042fb8ac68109f8bdb0fdd8118baf39318 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/media/platform/qcom/iris/iris_vb2.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "bd4f8fa216182f33c06d4c1e162975a0c42fb14e",
"status": "affected",
"version": "f8b136296722e258ec43237a35f72c92a6d4501a",
"versionType": "git"
},
{
"lessThan": "a58b9d1c1cf81c0b29f1983c63c3e0c0caa68398",
"status": "affected",
"version": "ad699fa78b59241c9d71a8cafb51525f3dab04d4",
"versionType": "git"
},
{
"lessThan": "370e19042fb8ac68109f8bdb0fdd8118baf39318",
"status": "affected",
"version": "ad699fa78b59241c9d71a8cafb51525f3dab04d4",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/media/platform/qcom/iris/iris_vb2.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.19"
},
{
"lessThan": "6.19",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.16",
"versionStartIncluding": "6.18.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.6",
"versionStartIncluding": "6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "6.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"media: iris: Add sanity check for stop streaming\"\n\nThis reverts commit ad699fa78b59241c9d71a8cafb51525f3dab04d4.\n\nRevert the check that skipped stop_streaming when the instance was in\nIRIS_INST_ERROR, as it caused multiple regressions:\n\n1. Buffers were not returned to vb2 when the instance was already in\n error state, triggering warnings in the vb2 core because buffer\n completion was skipped.\n\n2. If a session failed early (e.g. unsupported configuration), the\n instance transitioned to IRIS_INST_ERROR. When userspace attempted\n to stop streaming for cleanup, stop_streaming was skipped due to the\n added check, preventing proper teardown and leaving the firmware\n in an inconsistent state."
}
],
"providerMetadata": {
"dateUpdated": "2026-05-06T11:27:33.084Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/bd4f8fa216182f33c06d4c1e162975a0c42fb14e"
},
{
"url": "https://git.kernel.org/stable/c/a58b9d1c1cf81c0b29f1983c63c3e0c0caa68398"
},
{
"url": "https://git.kernel.org/stable/c/370e19042fb8ac68109f8bdb0fdd8118baf39318"
}
],
"title": "Revert \"media: iris: Add sanity check for stop streaming\"",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-43151",
"datePublished": "2026-05-06T11:27:33.084Z",
"dateReserved": "2026-05-01T14:12:55.989Z",
"dateUpdated": "2026-05-06T11:27:33.084Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-43151",
"date": "2026-05-07",
"epss": "0.00017",
"percentile": "0.04088"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-43151\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-06T12:16:32.827\",\"lastModified\":\"2026-05-06T13:07:51.607\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRevert \\\"media: iris: Add sanity check for stop streaming\\\"\\n\\nThis reverts commit ad699fa78b59241c9d71a8cafb51525f3dab04d4.\\n\\nRevert the check that skipped stop_streaming when the instance was in\\nIRIS_INST_ERROR, as it caused multiple regressions:\\n\\n1. Buffers were not returned to vb2 when the instance was already in\\n error state, triggering warnings in the vb2 core because buffer\\n completion was skipped.\\n\\n2. If a session failed early (e.g. unsupported configuration), the\\n instance transitioned to IRIS_INST_ERROR. When userspace attempted\\n to stop streaming for cleanup, stop_streaming was skipped due to the\\n added check, preventing proper teardown and leaving the firmware\\n in an inconsistent state.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/370e19042fb8ac68109f8bdb0fdd8118baf39318\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a58b9d1c1cf81c0b29f1983c63c3e0c0caa68398\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bd4f8fa216182f33c06d4c1e162975a0c42fb14e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…