media: vidtv: fix pass-by-value structs causing MSAN warnings
Summary
| CVE | CVE-2026-43058 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-02 07:16:20 UTC |
| Updated | 2026-05-02 07:16:20 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
media: vidtv: fix pass-by-value structs causing MSAN warnings
vidtv_ts_null_write_into() and vidtv_ts_pcr_write_into() take their
argument structs by value, causing MSAN to report uninit-value warnings.
While only vidtv_ts_null_write_into() has triggered a report so far,
both functions share the same issue.
Fix by passing both structs by const pointer instead, avoiding the
stack copy of the struct along with its MSAN shadow and origin metadata.
The functions do not modify the structs, which is enforced by the const
qualifier. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508 git |
Not specified |
| CNA |
Linux |
Linux |
affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 be57e52e27c7cbfb400a8f255e475cbcff242baa git |
Not specified |
| CNA |
Linux |
Linux |
affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4 git |
Not specified |
| CNA |
Linux |
Linux |
affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 57b01d945ed68cebe486d495dadc4901a96d3aaa git |
Not specified |
| CNA |
Linux |
Linux |
affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 1b2820c8a9887981634020db19f1a2425558b88e git |
Not specified |
| CNA |
Linux |
Linux |
affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 5f8e73bde67e931468bc2a1860d78d72f0c6ba41 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.10 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.136 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.83 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.24 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.14 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0.1 7.0.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.1-rc1 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/57b01d945ed68cebe486d495dadc4901a96d3aaa |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/5f8e73bde67e931468bc2a1860d78d72f0c6ba41 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/1b2820c8a9887981634020db19f1a2425558b88e |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/be57e52e27c7cbfb400a8f255e475cbcff242baa |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.