Description
In the Linux kernel, the following vulnerability has been resolved:

media: verisilicon: Avoid G2 bus error while decoding H.264 and HEVC

For the i.MX8MQ platform, there is a hardware limitation: the g1 VPU and
g2 VPU cannot decode simultaneously; otherwise, it will cause below bus
error and produce corrupted pictures, even potentially lead to system hang.

[ 110.527986] hantro-vpu 38310000.video-codec: frame decode timed out.
[ 110.583517] hantro-vpu 38310000.video-codec: bus error detected.

Therefore, it is necessary to ensure that g1 and g2 operate alternately.
This allows for successful multi-instance decoding of H.264 and HEVC.

To achieve this, g1 and g2 share the same v4l2_m2m_dev, and then the
v4l2_m2m_dev can handle the scheduling.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel media driver for Verisilicon VPUs on the i.MX8MQ board, running the g1 and g2 VPU sub‑systems simultaneously can trigger a bus error that corrupts decoded frames and may cause a system crash. The weakness arises from inadequate scheduling between the two hardware units, resulting in a denial‑of‑service impact that affects only availability; there is no direct threat to confidentiality or integrity.

Affected Systems

The flaw affects any device that runs the Linux kernel with the Verisilicon H.264/HEVC driver on an i.MX8MQ system. No specific kernel release is listed, so any kernel incorporating the affected driver code before the patch is vulnerable.

Risk and Exploitability

The CVSS score is not publicly disclosed, and the EPSS score is unavailable; the flaw is not listed in CISA’s KEV catalog. The only practical attack vector is local: a user able to initiate media decoding—such as a malicious video stream or application—could trigger the bus error, leading to frame corruption or a full system hang. Exploitation requires local or privileged access to the device and delivers a denial‑of‑service effect.

Generated by OpenCVE AI on May 9, 2026 at 03:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a Linux kernel update that includes the Verisilicon driver patch referenced in the kernel commit URLs.
  • Configure the VPU driver to enforce alternating usage of the g1 and g2 units through the shared v4l2_m2m_dev scheduler.
  • If an immediate kernel update is not possible, prevent simultaneous use of both VPU units by disabling one in the media pipeline or limiting the system to single‑instance H.264/HEVC decoding.

Generated by OpenCVE AI on May 9, 2026 at 03:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-673

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-673

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: media: verisilicon: Avoid G2 bus error while decoding H.264 and HEVC For the i.MX8MQ platform, there is a hardware limitation: the g1 VPU and g2 VPU cannot decode simultaneously; otherwise, it will cause below bus error and produce corrupted pictures, even potentially lead to system hang. [ 110.527986] hantro-vpu 38310000.video-codec: frame decode timed out. [ 110.583517] hantro-vpu 38310000.video-codec: bus error detected. Therefore, it is necessary to ensure that g1 and g2 operate alternately. This allows for successful multi-instance decoding of H.264 and HEVC. To achieve this, g1 and g2 share the same v4l2_m2m_dev, and then the v4l2_m2m_dev can handle the scheduling.
Title media: verisilicon: Avoid G2 bus error while decoding H.264 and HEVC
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:11:28.372Z

Reserved: 2026-05-01T14:12:56.000Z

Link: CVE-2026-43310

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:38.370

Modified: 2026-05-08T14:16:38.370

Link: CVE-2026-43310

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43310 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T04:00:14Z

Weaknesses