Description
In the Linux kernel, the following vulnerability has been resolved:

media: iris: gen1: Destroy internal buffers after FW releases

After the firmware releases internal buffers, the driver was not
destroying them. This left stale allocations that were no longer used,
especially across resolution changes where new buffers are allocated per
the updated requirements. As a result, memory was wasted until session
close.

Destroy internal buffers once the release response is received from the
firmware.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The kernel driver for Iris Gen1 devices fails to free internal buffers after the firmware issues a release response. As a result, allocations that are no longer required accumulate, especially when the device changes resolution and new buffers are allocated. The driver never releases those stale buffers, causing a memory leak that grows over time until the session ends. The consequence is increased memory utilization and potential exhaustion of the system's memory pool. No direct privilege escalation, data disclosure, or denial of service is provided by the flaw; the impact is primarily an availability issue due to resource exhaustion.

Affected Systems

Any Linux kernel running the Iris Gen1 media driver is affected. The exact kernel versions that contain the issue are not listed in the advisory; however, the bug resides in the Iris Gen1 driver implementation, which is a core component of the media subsystem. Systems that load the iris Gen1 module for hardware acceleration or camera support are at risk. Updating to a kernel that includes the patch is the recommended fix. Until then, disabling or blacklisting the iris Gen1 driver will prevent the stale buffer allocations.

Risk and Exploitability

The vulnerability is not listed in CISA's KEV catalog and no EPSS score is available, indicating low to medium exploitation probability. The flaw requires repeated interaction with the affected device by a local user; it does not provide remote code execution or privilege escalation. The primary risk is availability through gradual memory saturation, which can occur over prolonged use or in constrained environments. The risk remains modest if system memory is ample, but could become critical in servers or embedded devices where memory is limited.

Generated by OpenCVE AI on May 6, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that frees internal buffers on firmware release, as defined in the linked commit logs.
  • If the patch cannot be applied immediately, unload or blacklist the iris Gen1 driver until an official fix is available.
  • Monitor memory consumption on the media subsystem and restart the system if the driver causes memory growth.

Generated by OpenCVE AI on May 6, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: media: iris: gen1: Destroy internal buffers after FW releases After the firmware releases internal buffers, the driver was not destroying them. This left stale allocations that were no longer used, especially across resolution changes where new buffers are allocated per the updated requirements. As a result, memory was wasted until session close. Destroy internal buffers once the release response is received from the firmware.
Title media: iris: gen1: Destroy internal buffers after FW releases
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:26.856Z

Reserved: 2026-05-01T14:12:55.989Z

Link: CVE-2026-43142

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:31.633

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43142

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:30:06Z

Weaknesses