CVE-2026-31585
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
28/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: vidtv: fix nfeeds state corruption on start_streaming failure<br />
<br />
syzbot reported a memory leak in vidtv_psi_service_desc_init [1].<br />
<br />
When vidtv_start_streaming() fails inside vidtv_start_feed(), the<br />
nfeeds counter is left incremented even though no feed was actually<br />
started. This corrupts the driver state: subsequent start_feed calls<br />
see nfeeds > 1 and skip starting the mux, while stop_feed calls<br />
eventually try to stop a non-existent stream.<br />
<br />
This state corruption can also lead to memory leaks, since the mux<br />
and channel resources may be partially allocated during a failed<br />
start_streaming but never cleaned up, as the stop path finds<br />
dvb->streaming == false and returns early.<br />
<br />
Fix by decrementing nfeeds back when start_streaming fails, keeping<br />
the counter in sync with the actual number of active feeds.<br />
<br />
[1]<br />
BUG: memory leak<br />
unreferenced object 0xffff888145b50820 (size 32):<br />
comm "syz.0.17", pid 6068, jiffies 4294944486<br />
backtrace (crc 90a0c7d4):<br />
vidtv_psi_service_desc_init+0x74/0x1b0 drivers/media/test-drivers/vidtv/vidtv_psi.c:288<br />
vidtv_channel_s302m_init+0xb1/0x2a0 drivers/media/test-drivers/vidtv/vidtv_channel.c:83<br />
vidtv_channels_init+0x1b/0x40 drivers/media/test-drivers/vidtv/vidtv_channel.c:524<br />
vidtv_mux_init+0x516/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:518<br />
vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline]<br />
vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (including) | 7.0.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/17cb7957c979529cc98ff57f7ac331532f1f7c83
- https://git.kernel.org/stable/c/25f19e476ab15defe698504212899fdb9f7cd61b
- https://git.kernel.org/stable/c/4bf95f797edd63c93330eafb6d6e670982344b9b
- https://git.kernel.org/stable/c/83110c2c8c46c035c2e0fc8ff3e4991183bf9ccd
- https://git.kernel.org/stable/c/98c22210aeadce67d9d20059f0dbbd01ba7fdbba
- https://git.kernel.org/stable/c/a0e5a598fe9a4612b852406b51153b881592aede



