CVE-2024-57980

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277 -
  • () https://git.kernel.org/stable/c/87522ef165e5b6de8ef98cc318f3335166a1512c -
  • () https://git.kernel.org/stable/c/d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d -

07 Mar 2025, 20:44

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: uvcvideo: Se soluciona la doble liberación en la ruta de error Si la función uvc_status_init() no puede asignar el int_urb, liberará el puntero dev-&gt;status pero no restablecerá el puntero a NULL. Esto hace que la llamada kfree() en uvc_status_cleanup() intente liberar la memoria dos veces. Arréglelo restableciendo el puntero dev-&gt;status a NULL después de liberarlo. Revisado por: Ricardo Ribalda
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/6c36dcd662ec5276782838660f8533a7cb26be49 - () https://git.kernel.org/stable/c/6c36dcd662ec5276782838660f8533a7cb26be49 - Patch
References () https://git.kernel.org/stable/c/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d - () https://git.kernel.org/stable/c/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d - Patch
References () https://git.kernel.org/stable/c/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac - () https://git.kernel.org/stable/c/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac - Patch
References () https://git.kernel.org/stable/c/d1f8e69eec91d5a75ef079778a5d0151db2a7f22 - () https://git.kernel.org/stable/c/d1f8e69eec91d5a75ef079778a5d0151db2a7f22 - Patch
References () https://git.kernel.org/stable/c/d8e63dd7b6683969d3d47c7b8e9635f96d554ad4 - () https://git.kernel.org/stable/c/d8e63dd7b6683969d3d47c7b8e9635f96d554ad4 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-415

27 Feb 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 02:15

Updated : 2025-03-13 13:15


NVD link : CVE-2024-57980

Mitre link : CVE-2024-57980

CVE.ORG link : CVE-2024-57980


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free