CVE-2024-49981

7.0 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the Linux kernel's Venus media driver, where a race condition during device removal can cause the system to access freed memory. This affects Linux systems using the Venus video acceleration hardware. Attackers could potentially crash the system or execute arbitrary code.

💻 Affected Systems

Products:
  • Linux kernel with Venus media driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with Venus driver support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Qualcomm Venus video acceleration hardware. Requires the Venus driver to be loaded and active.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or arbitrary code execution with kernel privileges leading to complete system compromise.

🟠

Likely Case

System instability, kernel panic, or denial of service through system crashes.

🟢

If Mitigated

Limited to denial of service if exploit fails to achieve code execution.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger Venus driver operations.
🏢 Internal Only: MEDIUM - Local attackers or malicious users could exploit this to crash systems or potentially gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to trigger the race condition between venus_remove and venus_sys_error_handler. Timing the race makes exploitation challenging but possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 10941d4f99a5a34999121b314afcd9c0a1c14f15, 2a541fcc0bd2b05a458e9613376df1289ec11621, 5098b9e6377577fe13d03e1d8914930f014a3314, 60b6968341a6dd5353554f3e72db554693a128a5, 63bbe26471ebdcc3c20bb4cc3950d666279ad658

Vendor Advisory: https://git.kernel.org/stable/c/10941d4f99a5a34999121b314afcd9c0a1c14f15

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check your distribution's security advisories for backported patches. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable Venus driver

linux

Prevent loading of the vulnerable Venus media driver module

echo 'blacklist venus' >> /etc/modprobe.d/blacklist-venus.conf
rmmod venus

Restrict device access

linux

Limit access to Venus hardware devices to trusted users only

chmod 600 /dev/venus*
chown root:root /dev/venus*

🧯 If You Can't Patch

  • Restrict local user access to systems with Venus hardware
  • Implement strict privilege separation and limit who can load/unload kernel modules

🔍 How to Verify

Check if Vulnerable:

Check if Venus driver is loaded: lsmod | grep venus. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check if Venus driver can be safely removed without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Kernel oops messages mentioning venus
  • System crashes during media operations
  • Use-after-free warnings in kernel logs

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("venus" OR "use-after-free")

🔗 References

📤 Share & Export