CVE-2026-43151
Revert Fix for Iris Media Driver Stop Streaming Issue in Linux Kernel
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to a reverted change in the media iris driver that had added a sanity check for stopping streaming. The reverted commit had skipped the stop_streaming operation when the instance was in an error state (IRIS_INST_ERROR). This caused multiple issues: buffers were not returned properly, triggering warnings, and if a session failed early, the stop_streaming was skipped, preventing proper cleanup and leaving the firmware in an inconsistent state.
How can this vulnerability impact me? :
The impact of this vulnerability includes improper handling of streaming sessions in error states. Specifically, buffers may not be returned correctly, causing warnings and potential resource leaks. Additionally, failure to properly stop streaming can leave the firmware in an inconsistent state, which may affect device stability and reliability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability was resolved by reverting a commit that added a problematic sanity check in the Linux kernel media iris driver. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this revert, ensuring the stop_streaming function properly handles instances in the IRIS_INST_ERROR state.
- Check your current Linux kernel version.
- Update the Linux kernel to the latest stable release that contains the fix.
- Restart the system after the kernel update to apply changes.