{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43058","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:55.981Z","datePublished":"2026-05-02T06:11:50.870Z","dateUpdated":"2026-05-11T22:16:53.951Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:16:53.951Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: fix pass-by-value structs causing MSAN warnings\n\nvidtv_ts_null_write_into() and vidtv_ts_pcr_write_into() take their\nargument structs by value, causing MSAN to report uninit-value warnings.\nWhile only vidtv_ts_null_write_into() has triggered a report so far,\nboth functions share the same issue.\n\nFix by passing both structs by const pointer instead, avoiding the\nstack copy of the struct along with its MSAN shadow and origin metadata.\nThe functions do not modify the structs, which is enforced by the const\nqualifier."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/test-drivers/vidtv/vidtv_mux.c","drivers/media/test-drivers/vidtv/vidtv_ts.c","drivers/media/test-drivers/vidtv/vidtv_ts.h"],"versions":[{"version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","lessThan":"e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508","status":"affected","versionType":"git"},{"version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","lessThan":"be57e52e27c7cbfb400a8f255e475cbcff242baa","status":"affected","versionType":"git"},{"version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","lessThan":"6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4","status":"affected","versionType":"git"},{"version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","lessThan":"57b01d945ed68cebe486d495dadc4901a96d3aaa","status":"affected","versionType":"git"},{"version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","lessThan":"1b2820c8a9887981634020db19f1a2425558b88e","status":"affected","versionType":"git"},{"version":"f90cf6079bf67988f8b1ad1ade70fc89d0080905","lessThan":"5f8e73bde67e931468bc2a1860d78d72f0c6ba41","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/test-drivers/vidtv/vidtv_mux.c","drivers/media/test-drivers/vidtv/vidtv_ts.c","drivers/media/test-drivers/vidtv/vidtv_ts.h"],"versions":[{"version":"5.10","status":"affected"},{"version":"0","lessThan":"5.10","status":"unaffected","versionType":"semver"},{"version":"6.6.136","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.83","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.24","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19.14","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0.1","lessThanOrEqual":"7.0.*","status":"unaffected","versionType":"semver"},{"version":"7.1-rc1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.6.136"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.12.83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.18.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"6.19.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"7.0.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10","versionEndExcluding":"7.1-rc1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e3957eb26a3d570aefc6bb184fa8b8a1e9a4e508"},{"url":"https://git.kernel.org/stable/c/be57e52e27c7cbfb400a8f255e475cbcff242baa"},{"url":"https://git.kernel.org/stable/c/6d75a9ec5bdb8cf8382eaf8f8fe831ba7d58a9d4"},{"url":"https://git.kernel.org/stable/c/57b01d945ed68cebe486d495dadc4901a96d3aaa"},{"url":"https://git.kernel.org/stable/c/1b2820c8a9887981634020db19f1a2425558b88e"},{"url":"https://git.kernel.org/stable/c/5f8e73bde67e931468bc2a1860d78d72f0c6ba41"}],"title":"media: vidtv: fix pass-by-value structs causing MSAN warnings","x_generator":{"engine":"bippy-1.2.0"}}}}