U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31473 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex MEDIA_REQUEST_IOC_REINIT can run concurrently with VIDIOC_REQBUFS(0) queue teardown paths. This can race request object cleanup against vb2 queue cancellation and lead to use-after-free reports. We already serialize request queueing against STREAMON/OFF with req_queue_mutex. Extend that serialization to REQBUFS, and also take the same mutex in media_request_ioctl_reinit() so REINIT is in the same exclusion domain. This keeps request cleanup and queue cancellation from running in parallel for request-capable devices.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/1a0d9083c24fbd5d22f7100f09d11e4d696a5f01 kernel.org
https://git.kernel.org/stable/c/2c685e99efb3b3bd2b78699fba6b1cf321975db0 kernel.org
https://git.kernel.org/stable/c/331242998a7ade5c2f65e14988901614629f3db5 kernel.org
https://git.kernel.org/stable/c/585fd9a2063dacce8b2820f675ef23d5d17434c5 kernel.org
https://git.kernel.org/stable/c/72b9e81e0203f03c40f3adb457f55bd4c8eb112d kernel.org
https://git.kernel.org/stable/c/bef4f4a88b73e4cc550d25f665b8a9952af22773 kernel.org
https://git.kernel.org/stable/c/cf2023e84f0888f96f4b65dc0804e7f3651969c1 kernel.org
https://git.kernel.org/stable/c/d8549a453d5bdc0a71de66ad47a1106703406a56 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31473
NVD Published Date:
04/22/2026
NVD Last Modified:
04/23/2026
Source:
kernel.org