{"api_version":"1","generated_at":"2026-05-13T07:41:52+00:00","cve":"CVE-2026-43142","urls":{"html":"https://cve.report/CVE-2026-43142","api":"https://cve.report/api/cve/CVE-2026-43142.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43142","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43142"},"summary":{"title":"media: iris: gen1: Destroy internal buffers after FW releases","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: iris: gen1: Destroy internal buffers after FW releases\n\nAfter the firmware releases internal buffers, the driver was not\ndestroying them. This left stale allocations that were no longer used,\nespecially across resolution changes where new buffers are allocated per\nthe updated requirements. As a result, memory was wasted until session\nclose.\n\nDestroy internal buffers once the release response is received from the\nfirmware.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-06 12:16:31","updated_at":"2026-05-06 13:07:51"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/d4457f23ac0130240053a34be663f0fade3bb371","name":"https://git.kernel.org/stable/c/d4457f23ac0130240053a34be663f0fade3bb371","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/7cde76db8883ec8a3d1456068079ecadbfb15ca5","name":"https://git.kernel.org/stable/c/7cde76db8883ec8a3d1456068079ecadbfb15ca5","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/1dabf00ee206eceb0f08a1fe5d1ce635f9064338","name":"https://git.kernel.org/stable/c/1dabf00ee206eceb0f08a1fe5d1ce635f9064338","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43142","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43142","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 73702f45db81b74897b2808aaa13484826156006 7cde76db8883ec8a3d1456068079ecadbfb15ca5 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 73702f45db81b74897b2808aaa13484826156006 d4457f23ac0130240053a34be663f0fade3bb371 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 73702f45db81b74897b2808aaa13484826156006 1dabf00ee206eceb0f08a1fe5d1ce635f9064338 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.15","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.15 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.16 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.6 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/media/platform/qcom/iris/iris_hfi_gen1_command.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"7cde76db8883ec8a3d1456068079ecadbfb15ca5","status":"affected","version":"73702f45db81b74897b2808aaa13484826156006","versionType":"git"},{"lessThan":"d4457f23ac0130240053a34be663f0fade3bb371","status":"affected","version":"73702f45db81b74897b2808aaa13484826156006","versionType":"git"},{"lessThan":"1dabf00ee206eceb0f08a1fe5d1ce635f9064338","status":"affected","version":"73702f45db81b74897b2808aaa13484826156006","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/media/platform/qcom/iris/iris_hfi_gen1_command.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.15"},{"lessThan":"6.15","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.16","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.6","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.16","versionStartIncluding":"6.15","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.6","versionStartIncluding":"6.15","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.15","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: iris: gen1: Destroy internal buffers after FW releases\n\nAfter the firmware releases internal buffers, the driver was not\ndestroying them. This left stale allocations that were no longer used,\nespecially across resolution changes where new buffers are allocated per\nthe updated requirements. As a result, memory was wasted until session\nclose.\n\nDestroy internal buffers once the release response is received from the\nfirmware."}],"providerMetadata":{"dateUpdated":"2026-05-06T11:27:26.856Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/7cde76db8883ec8a3d1456068079ecadbfb15ca5"},{"url":"https://git.kernel.org/stable/c/d4457f23ac0130240053a34be663f0fade3bb371"},{"url":"https://git.kernel.org/stable/c/1dabf00ee206eceb0f08a1fe5d1ce635f9064338"}],"title":"media: iris: gen1: Destroy internal buffers after FW releases","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43142","datePublished":"2026-05-06T11:27:26.856Z","dateReserved":"2026-05-01T14:12:55.989Z","dateUpdated":"2026-05-06T11:27:26.856Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-06 12:16:31","lastModifiedDate":"2026-05-06 13:07:51","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43142","Ordinal":"1","Title":"media: iris: gen1: Destroy internal buffers after FW releases","CVE":"CVE-2026-43142","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43142","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: iris: gen1: Destroy internal buffers after FW releases\n\nAfter the firmware releases internal buffers, the driver was not\ndestroying them. This left stale allocations that were no longer used,\nespecially across resolution changes where new buffers are allocated per\nthe updated requirements. As a result, memory was wasted until session\nclose.\n\nDestroy internal buffers once the release response is received from the\nfirmware.","Type":"Description","Title":"media: iris: gen1: Destroy internal buffers after FW releases"}]}}}