CVE-2026-43146
Description
In the Linux kernel, the following vulnerability has been resolved:
media: iris: Add buffer to list only after successful allocation
Move list_add_tail() to after dma_alloc_attrs() succeeds when creating internal buffers. Previously, the buffer was enqueued in buffers->list before the DMA allocation. If the allocation failed, the function returned -ENOMEM while leaving a partially initialized buffer in the list, which could lead to inconsistent state and potential leaks.
By adding the buffer to the list only after dma_alloc_attrs() succeeds, we ensure the list contains only valid, fully initialized buffers.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's media/iris driver, a buffer is added to an internal list before DMA allocation succeeds, leading to potential memory leaks or system instability on allocation failure.
Vulnerability
Analysis
The CVE-2026-43146 describes a bug in the Linux kernel's media/iris driver where internal buffer creation adds a buffer to the buffers->list before verifying whether dma_alloc_attrs() succeeds. If the DMA allocation fails, the function returns -ENOMEM but the partially initialized buffer remains on the list, leading to an inconsistent state and potential memory leaks [1][2].
Exploitation
A local user or process that can interact with the media/iris subsystem (e.g., through device nodes) could trigger the allocation failure, causing list corruption. No special privileges beyond local access are required to reach the vulnerable code path.
Impact
An attacker could cause memory leaks by leaving dangling pointers in the list, or potentially trigger a denial of service by exhausting memory or causing undefined behavior on subsequent list operations. The CVSS v3 score of 5.5 indicates a medium-severity issue limited to local exploitation.
Mitigation
The fix ensures that list_add_tail() is called only after a successful DMA allocation. The patch has been applied to the stable kernel tree [3]. Users should update to the latest kernel version that includes this commit.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.