media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove()

Summary

CVECVE-2026-43270
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-06 12:16:48 UTC
Updated2026-05-08 20:00:20 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() In mtk_mdp_probe(), vpu_get_plat_device() increases the reference count of the returned platform device. Add platform_device_put() to prevent reference leak.

Risk And Classification

Primary CVSS: v3.1 5.5 MEDIUM from [email protected]

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem Types: NVD-CWE-Other

CVSS v3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Linux Linux Kernel All All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a 403b7c757ac9f6b2ffb7d00ff4795a245f5e8911 git Not specified
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a dd530e29bd514d7187b3e2df8eb2107419c7988f git Not specified
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a c44beed2e5caf2cbbe651432baa3a129f18b0169 git Not specified
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a 564fd3a63efc3ebbdb5d0a8fc7c0d3f753fbbd5d git Not specified
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a 4f2a51433a3a65d16975d1e32052d80656da077d git Not specified
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a a62ba5aa9ee95fd953583e95e519badf0b76ecf3 git Not specified
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a 2d93758f42a57f3485534eab858b308e41653de4 git Not specified
CNA Linux Linux affected c8eb2d7e8202fd9cb912f5d33cc34ede66dcb24a f128bab57b8018e526b7eda854ca20069863af47 git Not specified
CNA Linux Linux affected 4.10 Not specified
CNA Linux Linux unaffected 4.10 semver Not specified
CNA Linux Linux unaffected 5.10.252 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.202 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.165 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.128 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.75 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.16 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.6 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/403b7c757ac9f6b2ffb7d00ff4795a245f5e8911 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/4f2a51433a3a65d16975d1e32052d80656da077d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/f128bab57b8018e526b7eda854ca20069863af47 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/dd530e29bd514d7187b3e2df8eb2107419c7988f 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/a62ba5aa9ee95fd953583e95e519badf0b76ecf3 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/c44beed2e5caf2cbbe651432baa3a129f18b0169 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/564fd3a63efc3ebbdb5d0a8fc7c0d3f753fbbd5d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/2d93758f42a57f3485534eab858b308e41653de4 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report