{"api_version":"1","generated_at":"2026-05-02T12:28:22+00:00","cve":"CVE-2026-43058","urls":{"html":"https://cve.report/CVE-2026-43058","api":"https://cve.report/api/cve/CVE-2026-43058.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43058","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43058"},"summary":{"title":"media: vidtv: fix pass-by-value structs causing MSAN warnings","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: fix pass-by-value structs causing MSAN warnings\n\nvidtv_ts_null_write_into() and vidtv_ts_pcr_write_into() take their\nargument structs by value, causing MSAN to report uninit-value warnings.\nWhile only vidtv_ts_null_write_into() has triggered a report so far,\nboth functions share the same issue.\n\nFix by passing both structs by const pointer instead, avoiding the\nstack copy of the struct along with its MSAN shadow and origin metadata.\nThe functions do not modify the structs, which is enforced by the const\nqualifier.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-02 07:16:20","updated_at":"2026-05-02 07:16:20"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/57b01d945ed68cebe486d495dadc4901a96d3aaa","name":"https://git.kernel.org/stable/c/57b01d945ed68cebe486d495dadc4901a96d3aaa","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5f8e73bde67e931468bc2a1860d78d72f0c6ba41","name":"https://git.kernel.org/stable/c/5f8e73bde67e931468bc2a1860d78d72f0c6ba41","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/1b2820c8a9887981634020db19f1a2425558b88e","name":"https://git.kernel.org/stable/c/1b2820c8a9887981634020db19f1a2425558b88e","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/be57e52e27c7cbfb400a8f255e475cbcff242baa","name":"https://git.kernel.org/stable/c/be57e52e27c7cbfb400a8f255e475cbcff242baa","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4","name":"https://git.kernel.org/stable/c/6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508","name":"https://git.kernel.org/stable/c/e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43058","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43058","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 be57e52e27c7cbfb400a8f255e475cbcff242baa git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 57b01d945ed68cebe486d495dadc4901a96d3aaa git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 1b2820c8a9887981634020db19f1a2425558b88e git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected f90cf6079bf67988f8b1ad1ade70fc89d0080905 5f8e73bde67e931468bc2a1860d78d72f0c6ba41 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 5.10","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.136 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.83 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.24 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.14 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0.1 7.0.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.1-rc1 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/media/test-drivers/vidtv/vidtv_mux.c","drivers/media/test-drivers/vidtv/vidtv_ts.c","drivers/media/test-drivers/vidtv/vidtv_ts.h"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508","status":"affected","version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","versionType":"git"},{"lessThan":"be57e52e27c7cbfb400a8f255e475cbcff242baa","status":"affected","version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","versionType":"git"},{"lessThan":"6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4","status":"affected","version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","versionType":"git"},{"lessThan":"57b01d945ed68cebe486d495dadc4901a96d3aaa","status":"affected","version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","versionType":"git"},{"lessThan":"1b2820c8a9887981634020db19f1a2425558b88e","status":"affected","version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","versionType":"git"},{"lessThan":"5f8e73bde67e931468bc2a1860d78d72f0c6ba41","status":"affected","version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/media/test-drivers/vidtv/vidtv_mux.c","drivers/media/test-drivers/vidtv/vidtv_ts.c","drivers/media/test-drivers/vidtv/vidtv_ts.h"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"5.10"},{"lessThan":"5.10","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.136","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.83","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.24","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.14","versionType":"semver"},{"lessThanOrEqual":"7.0.*","status":"unaffected","version":"7.0.1","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.1-rc1","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.136","versionStartIncluding":"5.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.83","versionStartIncluding":"5.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.24","versionStartIncluding":"5.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.14","versionStartIncluding":"5.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0.1","versionStartIncluding":"5.10","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1-rc1","versionStartIncluding":"5.10","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: fix pass-by-value structs causing MSAN warnings\n\nvidtv_ts_null_write_into() and vidtv_ts_pcr_write_into() take their\nargument structs by value, causing MSAN to report uninit-value warnings.\nWhile only vidtv_ts_null_write_into() has triggered a report so far,\nboth functions share the same issue.\n\nFix by passing both structs by const pointer instead, avoiding the\nstack copy of the struct along with its MSAN shadow and origin metadata.\nThe functions do not modify the structs, which is enforced by the const\nqualifier."}],"providerMetadata":{"dateUpdated":"2026-05-02T06:11:50.870Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508"},{"url":"https://git.kernel.org/stable/c/be57e52e27c7cbfb400a8f255e475cbcff242baa"},{"url":"https://git.kernel.org/stable/c/6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4"},{"url":"https://git.kernel.org/stable/c/57b01d945ed68cebe486d495dadc4901a96d3aaa"},{"url":"https://git.kernel.org/stable/c/1b2820c8a9887981634020db19f1a2425558b88e"},{"url":"https://git.kernel.org/stable/c/5f8e73bde67e931468bc2a1860d78d72f0c6ba41"}],"title":"media: vidtv: fix pass-by-value structs causing MSAN warnings","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43058","datePublished":"2026-05-02T06:11:50.870Z","dateReserved":"2026-05-01T14:12:55.981Z","dateUpdated":"2026-05-02T06:11:50.870Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-02 07:16:20","lastModifiedDate":"2026-05-02 07:16:20","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43058","Ordinal":"1","Title":"media: vidtv: fix pass-by-value structs causing MSAN warnings","CVE":"CVE-2026-43058","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43058","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: fix pass-by-value structs causing MSAN warnings\n\nvidtv_ts_null_write_into() and vidtv_ts_pcr_write_into() take their\nargument structs by value, causing MSAN to report uninit-value warnings.\nWhile only vidtv_ts_null_write_into() has triggered a report so far,\nboth functions share the same issue.\n\nFix by passing both structs by const pointer instead, avoiding the\nstack copy of the struct along with its MSAN shadow and origin metadata.\nThe functions do not modify the structs, which is enforced by the const\nqualifier.","Type":"Description","Title":"media: vidtv: fix pass-by-value structs causing MSAN warnings"}]}}}