GHSA-2JVF-XC8M-3FHQ
Vulnerability from github – Published: 2026-01-13 18:31 – Updated: 2026-01-13 18:31
VLAI?
Details
In the Linux kernel, the following vulnerability has been resolved:
media: iris: Add sanity check for stop streaming
Add sanity check in iris_vb2_stop_streaming. If inst->state is already IRIS_INST_ERROR, we should skip the stream_off operation because it would still send packets to the firmware.
In iris_kill_session, inst->state is set to IRIS_INST_ERROR and session_close is executed, which will kfree(inst_hfi_gen2->packet). If stop_streaming is called afterward, it will cause a crash.
[bod: remove qcom from patch title]
{
"affected": [],
"aliases": [
"CVE-2025-68812"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-13T16:16:03Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: iris: Add sanity check for stop streaming\n\nAdd sanity check in iris_vb2_stop_streaming. If inst-\u003estate is\nalready IRIS_INST_ERROR, we should skip the stream_off operation\nbecause it would still send packets to the firmware.\n\nIn iris_kill_session, inst-\u003estate is set to IRIS_INST_ERROR and\nsession_close is executed, which will kfree(inst_hfi_gen2-\u003epacket).\nIf stop_streaming is called afterward, it will cause a crash.\n\n[bod: remove qcom from patch title]",
"id": "GHSA-2jvf-xc8m-3fhq",
"modified": "2026-01-13T18:31:04Z",
"published": "2026-01-13T18:31:04Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68812"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ad699fa78b59241c9d71a8cafb51525f3dab04d4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f8b136296722e258ec43237a35f72c92a6d4501a"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…