Home

Description

In the Linux kernel, the following vulnerability has been resolved: media: em28xx: fix use-after-free in em28xx_v4l2_open() em28xx_v4l2_open() reads dev->v4l2 without holding dev->lock, creating a race with em28xx_v4l2_init()'s error path and em28xx_v4l2_fini(), both of which free the em28xx_v4l2 struct and set dev->v4l2 to NULL under dev->lock. This race leads to two issues: - use-after-free in v4l2_fh_init() when accessing vdev->ctrl_handler, since the video_device is embedded in the freed em28xx_v4l2 struct. - NULL pointer dereference in em28xx_resolution_set() when accessing v4l2->norm, since dev->v4l2 has been set to NULL. Fix this by moving the mutex_lock() before the dev->v4l2 read and adding a NULL check for dev->v4l2 under the lock.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-24 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5fb2940327722b4684d2f964b54c1c90aa277324
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 871b8ea8ef39a6c253594649f4339378fad3d0dd
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 6b9e66437cc6123ddedac141e1b8b6fcf57d2972
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before dd2b888e08d3b3d6aacd65d76cd44fac11da750f
affected

Default status
affected

6.12.83 (semver)
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0.1 (semver)
unaffected

References

git.kernel.org/...c/5fb2940327722b4684d2f964b54c1c90aa277324

git.kernel.org/...c/871b8ea8ef39a6c253594649f4339378fad3d0dd

git.kernel.org/...c/6b9e66437cc6123ddedac141e1b8b6fcf57d2972

git.kernel.org/...c/dd2b888e08d3b3d6aacd65d76cd44fac11da750f

cve.org (CVE-2026-31583)

nvd.nist.gov (CVE-2026-31583)

Download JSON