๐Ÿ” CVE Alert

CVE-2024-49981

UNKNOWN 0.0

media: venus: fix use after free bug in venus_remove due to race condition

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: venus: fix use after free bug in venus_remove due to race condition in venus_probe, core->work is bound with venus_sys_error_handler, which is used to handle error. The code use core->sys_err_done to make sync work. The core->work is started in venus_event_notify. If we call venus_remove, there might be an unfished work. The possible sequence is as follows: CPU0 CPU1 |venus_sys_error_handler venus_remove | hfi_destroy | venus_hfi_destroy | kfree(hdev); | |hfi_reinit |venus_hfi_queues_reinit |//use hdev Fix it by canceling the work in venus_remove.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
af2c3834c8ca7cc65d15592ac671933df8848115 < 5098b9e6377577fe13d03e1d8914930f014a3314 af2c3834c8ca7cc65d15592ac671933df8848115 < 63bbe26471ebdcc3c20bb4cc3950d666279ad658 af2c3834c8ca7cc65d15592ac671933df8848115 < 60b6968341a6dd5353554f3e72db554693a128a5 af2c3834c8ca7cc65d15592ac671933df8848115 < bf6be32e2d39f6301ff1831e249d32a8744ab28a af2c3834c8ca7cc65d15592ac671933df8848115 < 2a541fcc0bd2b05a458e9613376df1289ec11621 af2c3834c8ca7cc65d15592ac671933df8848115 < b0686aedc5f1343442d044bd64eeac7e7a391f4e af2c3834c8ca7cc65d15592ac671933df8848115 < d925e9f7fb5a2dbefd1a73fc01061f38c7becd4c af2c3834c8ca7cc65d15592ac671933df8848115 < 10941d4f99a5a34999121b314afcd9c0a1c14f15 af2c3834c8ca7cc65d15592ac671933df8848115 < c5a85ed88e043474161bbfe54002c89c1cb50ee2
Linux / Linux
4.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5098b9e6377577fe13d03e1d8914930f014a3314 git.kernel.org: https://git.kernel.org/stable/c/63bbe26471ebdcc3c20bb4cc3950d666279ad658 git.kernel.org: https://git.kernel.org/stable/c/60b6968341a6dd5353554f3e72db554693a128a5 git.kernel.org: https://git.kernel.org/stable/c/bf6be32e2d39f6301ff1831e249d32a8744ab28a git.kernel.org: https://git.kernel.org/stable/c/2a541fcc0bd2b05a458e9613376df1289ec11621 git.kernel.org: https://git.kernel.org/stable/c/b0686aedc5f1343442d044bd64eeac7e7a391f4e git.kernel.org: https://git.kernel.org/stable/c/d925e9f7fb5a2dbefd1a73fc01061f38c7becd4c git.kernel.org: https://git.kernel.org/stable/c/10941d4f99a5a34999121b314afcd9c0a1c14f15 git.kernel.org: https://git.kernel.org/stable/c/c5a85ed88e043474161bbfe54002c89c1cb50ee2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html