CVE-2026-31473 PUBLISHED

media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex

MEDIA_REQUEST_IOC_REINIT can run concurrently with VIDIOC_REQBUFS(0) queue teardown paths. This can race request object cleanup against vb2 queue cancellation and lead to use-after-free reports.

We already serialize request queueing against STREAMON/OFF with req_queue_mutex. Extend that serialization to REQBUFS, and also take the same mutex in media_request_ioctl_reinit() so REINIT is in the same exclusion domain.

This keeps request cleanup and queue cancellation from running in parallel for request-capable devices.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to 331242998a7ade5c2f65e14988901614629f3db5 (excl.)
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to 2c685e99efb3b3bd2b78699fba6b1cf321975db0 (excl.)
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to 585fd9a2063dacce8b2820f675ef23d5d17434c5 (excl.)
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to 1a0d9083c24fbd5d22f7100f09d11e4d696a5f01 (excl.)
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to d8549a453d5bdc0a71de66ad47a1106703406a56 (excl.)
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to 72b9e81e0203f03c40f3adb457f55bd4c8eb112d (excl.)
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to cf2023e84f0888f96f4b65dc0804e7f3651969c1 (excl.)
  • affected from 6093d3002eabd7c2913d97f1d1f4ce34b072acf9 to bef4f4a88b73e4cc550d25f665b8a9952af22773 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.20 is affected
  • unaffected from 0 to 4.20 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.168 to 6.1.* (incl.)
  • unaffected from 6.6.131 to 6.6.* (incl.)
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References