CVE-2024-49981

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
21/10/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: venus: fix use after free bug in venus_remove due to race condition<br /> <br /> in venus_probe, core-&gt;work is bound with venus_sys_error_handler, which is<br /> used to handle error. The code use core-&gt;sys_err_done to make sync work.<br /> The core-&gt;work is started in venus_event_notify.<br /> <br /> If we call venus_remove, there might be an unfished work. The possible<br /> sequence is as follows:<br /> <br /> CPU0 CPU1<br /> <br /> |venus_sys_error_handler<br /> venus_remove |<br /> hfi_destroy |<br /> venus_hfi_destroy |<br /> kfree(hdev); |<br /> |hfi_reinit<br /> |venus_hfi_queues_reinit<br /> |//use hdev<br /> <br /> Fix it by canceling the work in venus_remove.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.13 (including) 5.10.227 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.168 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.113 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.55 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.14 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.11 (including) 6.11.3 (excluding)