CVE-2026-43146
Awaiting Analysis Awaiting Analysis - Queue
Memory Leak in Linux Kernel Iris Media Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: media: iris: Add buffer to list only after successful allocation Move `list_add_tail()` to after `dma_alloc_attrs()` succeeds when creating internal buffers. Previously, the buffer was enqueued in `buffers->list` before the DMA allocation. If the allocation failed, the function returned `-ENOMEM` while leaving a partially initialized buffer in the list, which could lead to inconsistent state and potential leaks. By adding the buffer to the list only after `dma_alloc_attrs()` succeeds, we ensure the list contains only valid, fully initialized buffers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the Linux kernel's media iris component where a buffer was added to a list before the successful allocation of DMA memory. Specifically, the function added the buffer to the list before confirming that the DMA allocation succeeded. If the allocation failed, the function returned an error but left a partially initialized buffer in the list, causing an inconsistent state and potential resource leaks.

The fix involved moving the operation that adds the buffer to the list to after the DMA allocation succeeds, ensuring that only fully initialized and valid buffers are added to the list.


How can this vulnerability impact me? :

This vulnerability can lead to an inconsistent internal state within the Linux kernel's media iris buffer management. Because partially initialized buffers remain in the list after a failed allocation, it can cause resource leaks and potentially unstable behavior in the system's media handling components.

Such inconsistent states and leaks could degrade system performance or reliability, and in some cases might be exploitable to cause denial of service or other unintended effects.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version where the fix has been applied. The fix involves ensuring that buffers are only added to the list after successful DMA allocation, preventing inconsistent states and potential leaks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart