Description
In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Return queued buffers on start_streaming() failure

Return buffers if streaming fails to start due to uvc_pm_get() error.

This bug may be responsible for a warning I got running

while :; do yavta -c3 /dev/video0; done

on an xHCI controller which failed under this workload.
I had no luck reproducing this warning again to confirm.

xhci_hcd 0000:09:00.0: HC died; cleaning up
usb 13-2: USB disconnect, device number 2
WARNING: CPU: 2 PID: 29386 at drivers/media/common/videobuf2/videobuf2-core.c:1803 vb2_start_streaming+0xac/0x120
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A bug in the Linux kernel media uvcvideo driver causes queued video buffers to be incorrectly returned when start_streaming() fails because uvc_pm_get() encounters an error. The improper error handling can lead to kernel warnings, device disconnects, and potentially system instability or halt for connected USB video devices. The vulnerability does not provide a direct attack vector for code execution or privilege escalation; its impact is limited to denial of service or device malfunction on systems that use the affected driver.

Affected Systems

All Linux kernel builds that include the uvcvideo driver prior to the commit fixed in the referenced patch URLs. Specific affected kernel versions are not listed here, but any kernel following the paths in the provided git commits is likely impacted.

Risk and Exploitability

The CVSS score is 5.5, and the EPSS score is unavailable, indicating there is no known high exploitation probability. The vulnerability is not listed in CISA's KEV catalog. The likely attack vector is local, requiring access to the USB video device interface; it would need an attacker with physical or elevated local access to trigger the failure scenario. Because the flaw only impacts device stability rather than confidentiality or integrity, the overall risk is moderate and can be mitigated by applying the upstream patch.

Generated by OpenCVE AI on May 9, 2026 at 01:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest kernel update that includes the commit identified in the provided git URLs.
  • If a kernel update is not immediately possible, disable or avoid using UVC video devices that rely on the uvcvideo driver until a patch is applied.
  • Continuously monitor kernel logs for vb2_start_streaming warnings and xHCI controller errors to detect potential service disruption.

Generated by OpenCVE AI on May 9, 2026 at 01:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Return queued buffers on start_streaming() failure Return buffers if streaming fails to start due to uvc_pm_get() error. This bug may be responsible for a warning I got running while :; do yavta -c3 /dev/video0; done on an xHCI controller which failed under this workload. I had no luck reproducing this warning again to confirm. xhci_hcd 0000:09:00.0: HC died; cleaning up usb 13-2: USB disconnect, device number 2 WARNING: CPU: 2 PID: 29386 at drivers/media/common/videobuf2/videobuf2-core.c:1803 vb2_start_streaming+0xac/0x120
Title media: uvcvideo: Return queued buffers on start_streaming() failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:11:14.646Z

Reserved: 2026-05-01T14:12:55.999Z

Link: CVE-2026-43290

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:36.010

Modified: 2026-05-08T14:16:36.010

Link: CVE-2026-43290

cve-icon Redhat

Severity : Low

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43290 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T02:00:19Z

Weaknesses