Home

Description

In the Linux kernel, the following vulnerability has been resolved: media: iris: gen1: Destroy internal buffers after FW releases After the firmware releases internal buffers, the driver was not destroying them. This left stale allocations that were no longer used, especially across resolution changes where new buffers are allocated per the updated requirements. As a result, memory was wasted until session close. Destroy internal buffers once the release response is received from the firmware.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-06 | Updated 2026-05-06 | Assigner Linux

Product status

Default status
unaffected

73702f45db81b74897b2808aaa13484826156006 (git) before 7cde76db8883ec8a3d1456068079ecadbfb15ca5
affected

73702f45db81b74897b2808aaa13484826156006 (git) before d4457f23ac0130240053a34be663f0fade3bb371
affected

73702f45db81b74897b2808aaa13484826156006 (git) before 1dabf00ee206eceb0f08a1fe5d1ce635f9064338
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/7cde76db8883ec8a3d1456068079ecadbfb15ca5

git.kernel.org/...c/d4457f23ac0130240053a34be663f0fade3bb371

git.kernel.org/...c/1dabf00ee206eceb0f08a1fe5d1ce635f9064338

cve.org (CVE-2026-43142)

nvd.nist.gov (CVE-2026-43142)

Download JSON