CVE-2026-43312
Description
In the Linux kernel, the following vulnerability has been resolved:
media: i2c: ov5647: Initialize subdev before controls
In ov5647_init_controls() we call v4l2_get_subdevdata, but it is initialized by v4l2_i2c_subdev_init() in the probe, which currently happens after init_controls(). This can result in a segfault if the error condition is hit, and we try to access i2c_client, so fix the order.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free or segfault in Linux kernel's ov5647 camera driver due to accessing uninitialized subdev data during error handling.
Vulnerability
Overview
In the Linux kernel's ov5647 camera sensor driver (media/i2c/ov5647) contains an initialization ordering flaw. In ov5647_init_controls(), the function calls v4l2_get_subdevdata() before v4l2_i2c_subdev_init() has been executed in the probe path. Because v4l2_get_subdevdata returns a pointer that is only set by v4l2_i2c_subdev_init, accessing it prematurely leads to dereferencing a null or uninitialized pointer, causing a segmentation fault if an error condition is hit [1].
Exploitation and
Impact
An attacker would need ability to trigger the error path in the ov5647_init_controls() function, typically by causing a memory allocation failure or other error or an invalid control initialization. The vulnerability does not require special privileges beyond the ability to cause the driver to probe (e.g., by attaching a malicious I2C device or exploiting a system with this sensor hardware). On systems using this driver, a local attacker or crafted device could cause a kernel crash (denial of service), potentially leading to system unavailability [1].
Mitigation
Status
The fix is committed to the Linux kernel stable tree in commit 8ecb21c20387cc0c8aa00489a21ccc69f6b0f5d1 [1]. It reorders the probe sequence so that v4l2_i2c_subdev_init() is called before ov5647_init_controls(). Users should apply the kernel patch or update to a kernel version containing the backport.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/2dedda97a64e7735844609c6c77c0dd953d73833nvdPatch
- git.kernel.org/stable/c/59e372aa4cf60e2500eba7f978acdcb18bb49032nvdPatch
- git.kernel.org/stable/c/8ecb21c20387cc0c8aa00489a21ccc69f6b0f5d1nvdPatch
- git.kernel.org/stable/c/cabd025182cfed4a19b3aab57493e312d681e398nvdPatch
- git.kernel.org/stable/c/eee13cbccacb6d0a3120c126b8544030905b069dnvdPatch
- git.kernel.org/stable/c/f2a1998bc0053ebfe137f65081ed13afd9f34502nvdPatch
- git.kernel.org/stable/c/fb69e4842f5b463ff5f121d2ac7746014e3477eanvdPatch
News mentions
0No linked articles in our index yet.