CVE-2025-71140
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/01/2026
Última modificación:
14/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
media: mediatek: vcodec: Use spinlock for context list protection lock<br />
<br />
Previously a mutex was added to protect the encoder and decoder context<br />
lists from unexpected changes originating from the SCP IP block, causing<br />
the context pointer to go invalid, resulting in a NULL pointer<br />
dereference in the IPI handler.<br />
<br />
Turns out on the MT8173, the VPU IPI handler is called from hard IRQ<br />
context. This causes a big warning from the scheduler. This was first<br />
reported downstream on the ChromeOS kernels, but is also reproducible<br />
on mainline using Fluster with the FFmpeg v4l2m2m decoders. Even though<br />
the actual capture format is not supported, the affected code paths<br />
are triggered.<br />
<br />
Since this lock just protects the context list and operations on it are<br />
very fast, it should be OK to switch to a spinlock.



