In the Linux kernel, the following vulnerability has been resolved:
media: mc: Fix graph walk in mediapipelinestart
The graph walk tries to follow all links, even if they are not between pads. This causes a crash with, e.g. a MEDIALNKFLANCILLARYLINK link.
Fix this by allowing the walk to proceed only for MEDIALNKFLDATALINK links.
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bee9440bc0b6b3b7432f7bfde28656262a3484a2", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c" }, "digest": { "line_hashes": [ "275264846748403978398455974688083560223", "201722629592419323969175305152032284822", "269664791972900310827078686106915326730" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-39481-0f100c1a" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@788fd0f11e45ae8d3a8ebbd3452a6e83f92db376", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c", "function": "media_pipeline_explore_next_link" }, "digest": { "length": 1478.0, "function_hash": "198509150714511408173315960856290111144" }, "deprecated": false, "signature_type": "Function", "id": "CVE-2024-39481-3dd0dcf3" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e80d9db99b7b6c697d8d952dfd25c3425cf61499", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c" }, "digest": { "line_hashes": [ "275264846748403978398455974688083560223", "201722629592419323969175305152032284822", "269664791972900310827078686106915326730" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-39481-831cc9d7" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e80d9db99b7b6c697d8d952dfd25c3425cf61499", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c", "function": "media_pipeline_explore_next_link" }, "digest": { "length": 1478.0, "function_hash": "198509150714511408173315960856290111144" }, "deprecated": false, "signature_type": "Function", "id": "CVE-2024-39481-9c4a792f" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@788fd0f11e45ae8d3a8ebbd3452a6e83f92db376", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c" }, "digest": { "line_hashes": [ "275264846748403978398455974688083560223", "201722629592419323969175305152032284822", "269664791972900310827078686106915326730" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-39481-abb0c895" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a9d420149c477e7c97fbd6453704e4612bdd3fa", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c" }, "digest": { "line_hashes": [ "275264846748403978398455974688083560223", "201722629592419323969175305152032284822", "269664791972900310827078686106915326730" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "CVE-2024-39481-d1b33405" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bee9440bc0b6b3b7432f7bfde28656262a3484a2", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c", "function": "media_pipeline_explore_next_link" }, "digest": { "length": 1478.0, "function_hash": "198509150714511408173315960856290111144" }, "deprecated": false, "signature_type": "Function", "id": "CVE-2024-39481-df59045c" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8a9d420149c477e7c97fbd6453704e4612bdd3fa", "signature_version": "v1", "target": { "file": "drivers/media/mc/mc-entity.c", "function": "media_pipeline_explore_next_link" }, "digest": { "length": 1478.0, "function_hash": "198509150714511408173315960856290111144" }, "deprecated": false, "signature_type": "Function", "id": "CVE-2024-39481-ef28a461" } ]