VYPR
Medium severity5.5NVD Advisory· Published May 6, 2026· Updated May 12, 2026

CVE-2026-43177

CVE-2026-43177

Description

In the Linux kernel, the following vulnerability has been resolved:

media: ipu6: Fix RPM reference leak in probe error paths

Several error paths in ipu6_pci_probe() were jumping directly to out_ipu6_bus_del_devices without releasing the runtime PM reference. Add pm_runtime_put_sync() before cleaning up other resources.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A runtime PM reference leak in the Linux kernel's ipu6 driver can cause resource exhaustion during probe failures.

Vulnerability

Description

CVE-2026-43177 is a runtime power management (RPM) reference leak in the Linux kernel's Intel IPU6 (Image Processing Unit 6 (ipu6) driver. The vulnerability exists in the ipu6_pci_probe() function, where several error paths jump directly to the cleanup label out_ipu6_bus_del_devices without first releasing the RPM reference that was acquired earlier in the probe sequence. This omission means that when a probe fails after the RPM reference is taken, the reference count is not decremented, leading to an unbalanced RPM state [1].

Exploitation and

Impact

To trigger this bug, an attacker would need to cause a probe failure in the ipu6 driver, for example by manipulating hardware state or providing malformed device configuration. The attack requires local access to the system and the ability to trigger driver probing, which typically means physical presence or control of a user-space process that can unbind/bind the device. No special privileges are needed beyond the ability to interact with the device operations that cause probe errors. The impact is a denial of service (CVSS v3 base score 5.5, Medium severity) because the leaked RPM reference prevents the device from entering a low-power state, potentially causing increased power consumption and, in extreme cases, system instability or hang if the reference count overflows [1].

Mitigation

The fix, already applied in the Linux kernel stable tree, adds a pm_runtime_put_sync() call before the cleanup label to ensure the RPM reference is released on all error paths. Users should update to a kernel version containing the commit fdc06d36dab7 or any of the other stable backports [1][2][3][4]. No workaround is available; the only mitigation is to apply the kernel patch.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.