Description
In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-async: Fix error handling on steps after finding a match

Once an async connection is found to be matching with an fwnode, a
sub-device may be registered (in case it wasn't already), its bound
operation is called, ancillary links are created, the async connection
is added to the sub-device's list of connections and removed from the
global waiting connection list. Further on, the sub-device's possible own
notifier is searched for possible additional matches.

Fix these specific issues:

- If v4l2_async_match_notify() failed before the sub-notifier handling,
the async connection was unbound and its entry removed from the
sub-device's async connection list. The latter part was also done in
v4l2_async_match_notify().

- The async connection's sd field was only set after creating ancillary
links in v4l2_async_match_notify(). It was however dereferenced in
v4l2_async_unbind_subdev_one(), which was called on error path of
v4l2_async_match_notify() failure.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw lies in the Linux kernel media subsystem where asynchronous connections are bound to hardware devices. When an async connection matches a firmware node and the sub-device is registered, a failure in the notification logic can leave the async connection in an inconsistent state. The implementation may dereference an uninitialized or stale kernel pointer, which can cause a kernel crash or potentially provide a foothold for arbitrary memory corruption. The documented updates address the possibility of dereferencing a non‑initialized field and incorrectly removing entries from connection lists on error paths.

Affected Systems

All running Linux kernels that ship the upstream media v4l2‑async code before the patch. The specific affected kernel versions are not enumerated in the advisory, but any distribution using a kernel build prior to the commit cited in the reference URLs would be vulnerable.

Risk and Exploitability

Because the advisory does not provide a CVSS or EPSS score, the precise exploitability is unknown. However, the vulnerability’s root cause is a kernel pointer dereference that can lead to a kernel panic. The attack vector likely requires the ability to cause a failed async match, which implies either a local user with access to the media subsystem or a compromised device driver. The KEV status is not listed, indicating no known widespread exploitation instances.

Generated by OpenCVE AI on May 6, 2026 at 14:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel update that incorporates the v4l2‑async patch
  • Temporarily disable or remove unused media devices that may trigger async connections
  • If running a custom kernel, re‑configure the media subsystem to use safer async handling or disable the async matching feature where not needed

Generated by OpenCVE AI on May 6, 2026 at 14:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: media: v4l2-async: Fix error handling on steps after finding a match Once an async connection is found to be matching with an fwnode, a sub-device may be registered (in case it wasn't already), its bound operation is called, ancillary links are created, the async connection is added to the sub-device's list of connections and removed from the global waiting connection list. Further on, the sub-device's possible own notifier is searched for possible additional matches. Fix these specific issues: - If v4l2_async_match_notify() failed before the sub-notifier handling, the async connection was unbound and its entry removed from the sub-device's async connection list. The latter part was also done in v4l2_async_match_notify(). - The async connection's sd field was only set after creating ancillary links in v4l2_async_match_notify(). It was however dereferenced in v4l2_async_unbind_subdev_one(), which was called on error path of v4l2_async_match_notify() failure.
Title media: v4l2-async: Fix error handling on steps after finding a match
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:59.108Z

Reserved: 2026-05-01T14:12:55.992Z

Link: CVE-2026-43189

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:37.723

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:30:06Z

Weaknesses