Description
In the Linux kernel, the following vulnerability has been resolved:

media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update()

vfe_isr() iterates using MSM_VFE_IMAGE_MASTERS_NUM(7) as the loop
bound and passes the index to vfe_isr_reg_update(). However,
vfe->line[] array is defined with VFE_LINE_NUM_MAX(4):

struct vfe_line line[VFE_LINE_NUM_MAX];

When index is 4, 5, 6, the access to vfe->line[line_id] exceeds
the array bounds and resulting in out-of-bounds memory access.

Fix this by using separate loops for output lines and write masters.
Published: 2026-05-06
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel's Qualcomm media subsystem, the vfe_isr() function iterates over seven image master indices but writes to a line array that is only sized for four elements. When the index reaches 4, 5, or 6, the code accesses memory beyond the bounds of vfe->line[], producing an out-of-bounds array access. This kernel memory corruption can potentially allow a local attacker to read or modify arbitrary kernel memory, leading to privilege escalation or system compromise.

Affected Systems

The flaw resides in the Linux kernel media driver for Qualcomm camera hardware (qcom camss vfe). Any Linux system that includes the affected kernel version and utilizes the Qualcomm Camera SubSystem driver is impacted. The announcement lists only the generic product 'Linux:Linux', and no specific kernel versions are supplied, so any kernel build containing the legacy vfe_isr_reg_update behaviour is vulnerable.

Risk and Exploitability

Because the vulnerability results in an out-of-bounds memory access within the kernel, it is classified as a potential kernel memory corruption flaw. The EPSS score of < 1% indicates a very low probability of exploitation, and the flaw is not yet listed in the CISA KEV catalog. The most likely attack vector is local privilege exploitation where a user with the ability to trigger the camera subsystem can invoke the faulty loop. The lack of a publicly known exploit and absence of a KEV flag suggest that the risk remains low to moderate pending patch deployment.

Generated by OpenCVE AI on May 7, 2026 at 16:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the commit fixing the vfe isr loop bounds, which is referenced in the supplied kernel sources.
  • If an immediate kernel upgrade is not feasible, disable or remove the Qualcomm camera subsystem modules (e.g., vfe or camss) to prevent use of the vulnerable code.
  • Monitor kernel logs for attempts to trigger the out-of-bounds access and keep an eye on vendor advisories for further mitigation or a possible exploit release.

Generated by OpenCVE AI on May 7, 2026 at 16:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 15:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125

Thu, 07 May 2026 12:15:00 +0000


Wed, 06 May 2026 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() vfe_isr() iterates using MSM_VFE_IMAGE_MASTERS_NUM(7) as the loop bound and passes the index to vfe_isr_reg_update(). However, vfe->line[] array is defined with VFE_LINE_NUM_MAX(4): struct vfe_line line[VFE_LINE_NUM_MAX]; When index is 4, 5, 6, the access to vfe->line[line_id] exceeds the array bounds and resulting in out-of-bounds memory access. Fix this by using separate loops for output lines and write masters.
Title media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:45.209Z

Reserved: 2026-05-01T14:12:55.996Z

Link: CVE-2026-43256

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:46.397

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43256

cve-icon Redhat

Severity :

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43256 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T16:30:15Z

Weaknesses