CVE-2026-31599
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
24/04/2026
Last modified:
29/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections<br />
<br />
syzbot reported a general protection fault in vidtv_psi_desc_assign [1].<br />
<br />
vidtv_psi_pmt_stream_init() can return NULL on memory allocation<br />
failure, but vidtv_channel_pmt_match_sections() does not check for<br />
this. When tail is NULL, the subsequent call to<br />
vidtv_psi_desc_assign(&tail->descriptor, desc) dereferences a NULL<br />
pointer offset, causing a general protection fault.<br />
<br />
Add a NULL check after vidtv_psi_pmt_stream_init(). On failure, clean<br />
up the already-allocated stream chain and return.<br />
<br />
[1]<br />
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI<br />
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]<br />
RIP: 0010:vidtv_psi_desc_assign+0x24/0x90 drivers/media/test-drivers/vidtv/vidtv_psi.c:629<br />
Call Trace:<br />
<br />
vidtv_channel_pmt_match_sections drivers/media/test-drivers/vidtv/vidtv_channel.c:349 [inline]<br />
vidtv_channel_si_init+0x1445/0x1a50 drivers/media/test-drivers/vidtv/vidtv_channel.c:479<br />
vidtv_mux_init+0x526/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:519<br />
vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline]<br />
vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 6.6.136 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (including) | 7.0.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/07c1e474cf9acf777f09d14a8f8dfcef5b84e46f
- https://git.kernel.org/stable/c/2dff11fb5098ae453651f8f77e94ad499c078022
- https://git.kernel.org/stable/c/b7efb4c94797c504a1c678edb48c2aa311d3309f
- https://git.kernel.org/stable/c/b832cfd516b8504e95884622cee60bf9a39b7945
- https://git.kernel.org/stable/c/e589de36da106ef739ba98f66f5a5c2023370706
- https://git.kernel.org/stable/c/f8e1fc918a9fe67103bcda01d20d745f264d00a7



