VYPR
Unrated severityNVD Advisory· Published Jul 5, 2024· Updated May 4, 2025

media: mc: Fix graph walk in media_pipeline_start

CVE-2024-39481

Description

In the Linux kernel, the following vulnerability has been resolved:

media: mc: Fix graph walk in media_pipeline_start

The graph walk tries to follow all links, even if they are not between pads. This causes a crash with, e.g. a MEDIA_LNK_FL_ANCILLARY_LINK link.

Fix this by allowing the walk to proceed only for MEDIA_LNK_FL_DATA_LINK links.

Affected products

48

Patches

4

Vulnerability mechanics

Root cause

"The media graph walk incorrectly attempts to traverse all link types, including non-data links, leading to a crash."

Attack vector

An attacker can trigger this vulnerability by interacting with the media controller interface to initiate a graph walk. If the media graph contains non-data links, such as `MEDIA_LNK_FL_ANCILLARY_LINK`, the kernel attempts to follow these links incorrectly. This leads to a system crash due to the improper handling of these link types during the traversal process [patch_id=165994].

Affected code

The vulnerability is located in the `media_pipeline_start` function within the Linux kernel's media subsystem. The issue arises from an improper graph walk implementation that fails to filter link types during traversal [patch_id=165994].

What the fix does

The patch modifies the graph walk logic in `media_pipeline_start` to explicitly check the link type before proceeding. It ensures that the walk only follows links marked as `MEDIA_LNK_FL_DATA_LINK`. By ignoring other link types like `MEDIA_LNK_FL_ANCILLARY_LINK`, the kernel avoids the invalid operations that previously caused the crash [patch_id=165994].

Preconditions

  • configThe system must have a media graph configured with non-data links, such as ancillary links.

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.