CVE-2026-31585
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
28/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: vidtv: fix nfeeds state corruption on start_streaming failure<br />
<br />
syzbot reported a memory leak in vidtv_psi_service_desc_init [1].<br />
<br />
When vidtv_start_streaming() fails inside vidtv_start_feed(), the<br />
nfeeds counter is left incremented even though no feed was actually<br />
started. This corrupts the driver state: subsequent start_feed calls<br />
see nfeeds > 1 and skip starting the mux, while stop_feed calls<br />
eventually try to stop a non-existent stream.<br />
<br />
This state corruption can also lead to memory leaks, since the mux<br />
and channel resources may be partially allocated during a failed<br />
start_streaming but never cleaned up, as the stop path finds<br />
dvb->streaming == false and returns early.<br />
<br />
Fix by decrementing nfeeds back when start_streaming fails, keeping<br />
the counter in sync with the actual number of active feeds.<br />
<br />
[1]<br />
BUG: memory leak<br />
unreferenced object 0xffff888145b50820 (size 32):<br />
comm "syz.0.17", pid 6068, jiffies 4294944486<br />
backtrace (crc 90a0c7d4):<br />
vidtv_psi_service_desc_init+0x74/0x1b0 drivers/media/test-drivers/vidtv/vidtv_psi.c:288<br />
vidtv_channel_s302m_init+0xb1/0x2a0 drivers/media/test-drivers/vidtv/vidtv_channel.c:83<br />
vidtv_channels_init+0x1b/0x40 drivers/media/test-drivers/vidtv/vidtv_channel.c:524<br />
vidtv_mux_init+0x516/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:518<br />
vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194 [inline]<br />
vidtv_start_feed+0x33e/0x4d0 drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (incluyendo) | 6.6.136 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.83 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.24 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.14 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 7.0 (incluyendo) | 7.0.1 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/17cb7957c979529cc98ff57f7ac331532f1f7c83
- https://git.kernel.org/stable/c/25f19e476ab15defe698504212899fdb9f7cd61b
- https://git.kernel.org/stable/c/4bf95f797edd63c93330eafb6d6e670982344b9b
- https://git.kernel.org/stable/c/83110c2c8c46c035c2e0fc8ff3e4991183bf9ccd
- https://git.kernel.org/stable/c/98c22210aeadce67d9d20059f0dbbd01ba7fdbba
- https://git.kernel.org/stable/c/a0e5a598fe9a4612b852406b51153b881592aede



