media: i2c: ov5647: Initialize subdev before controls

Summary

CVECVE-2026-43312
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-08 14:16:39 UTC
Updated2026-05-12 14:10:27 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: media: i2c: ov5647: Initialize subdev before controls In ov5647_init_controls() we call v4l2_get_subdevdata, but it is initialized by v4l2_i2c_subdev_init() in the probe, which currently happens after init_controls(). This can result in a segfault if the error condition is hit, and we try to access i2c_client, so fix the order.

Risk And Classification

EPSS: 0.000240000 probability, percentile 0.070360000 (date 2026-05-12)

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 4974c2f19fd810ec9a4e534bfc69e176256b7a03 f2a1998bc0053ebfe137f65081ed13afd9f34502 git Not specified
CNA Linux Linux affected 4974c2f19fd810ec9a4e534bfc69e176256b7a03 59e372aa4cf60e2500eba7f978acdcb18bb49032 git Not specified
CNA Linux Linux affected 4974c2f19fd810ec9a4e534bfc69e176256b7a03 cabd025182cfed4a19b3aab57493e312d681e398 git Not specified
CNA Linux Linux affected 4974c2f19fd810ec9a4e534bfc69e176256b7a03 2dedda97a64e7735844609c6c77c0dd953d73833 git Not specified
CNA Linux Linux affected 4974c2f19fd810ec9a4e534bfc69e176256b7a03 8ecb21c20387cc0c8aa00489a21ccc69f6b0f5d1 git Not specified
CNA Linux Linux affected 4974c2f19fd810ec9a4e534bfc69e176256b7a03 fb69e4842f5b463ff5f121d2ac7746014e3477ea git Not specified
CNA Linux Linux affected 4974c2f19fd810ec9a4e534bfc69e176256b7a03 eee13cbccacb6d0a3120c126b8544030905b069d git Not specified
CNA Linux Linux affected 5.12 Not specified
CNA Linux Linux unaffected 5.12 semver Not specified
CNA Linux Linux unaffected 5.15.202 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.165 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.128 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.75 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.16 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.6 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/59e372aa4cf60e2500eba7f978acdcb18bb49032 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/f2a1998bc0053ebfe137f65081ed13afd9f34502 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/eee13cbccacb6d0a3120c126b8544030905b069d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/fb69e4842f5b463ff5f121d2ac7746014e3477ea 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/cabd025182cfed4a19b3aab57493e312d681e398 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/2dedda97a64e7735844609c6c77c0dd953d73833 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/8ecb21c20387cc0c8aa00489a21ccc69f6b0f5d1 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report