CVE-2024-24861
Linux Kernel vulnerability analysis and mitigation

Overview

A race condition vulnerability was discovered in the Linux kernel's media/xc4000 device driver, specifically in the xc4000_get_frequency() function. The vulnerability was assigned CVE-2024-24861 and was first reported on February 1, 2024, by Bai Jiaju from the School of Cyberspace Security at Beihang University. The vulnerability affects Linux kernel versions up to 3.0.101 and from version 6.0 up to 6.7.2 (NVD).

Technical details

The vulnerability stems from a race condition in the xc4000_get_frequency() function where frequency values are read through '*freq = priv->freq_hz + priv->freq_offset' without holding any locks. During this read operation, priv->freq_hz and priv->freq_offset can be concurrently updated by xc4000_set_params, potentially resulting in mismatched values and return value overflow issues. The vulnerability has been assigned a CVSS v3.1 base score of 6.3 (Medium) by NIST with vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H (OpenAnolis).

Impact

The vulnerability affects media devices using xc4000 as a tuner. When exploited, it can cause the return of incorrect frequency values, affecting related ioctl operations. In devices like em28xx that rely on reading frequency to set new frequencies, it can lead to setting illegal frequency values, causing device malfunctions. This can ultimately result in denial of service conditions (OpenAnolis).

Mitigation and workarounds

A fix has been developed that implements proper locking mechanisms in the xc4000_get_frequency function. The solution involves holding the priv->lock mutex lock when reading priv->freq_hz and priv->freq_offset to prevent concurrent updates from xc4000_set_params. The patch has been queued in linux-next and is available in various distribution updates including Ubuntu and Debian (OpenAnolis, Ubuntu).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-uki-virt-addons
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules-core
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • linux-ibm-5.15
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management