CVE-2024-27077

Source
https://cve.org/CVERecord?id=CVE-2024-27077
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27077.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27077
Downstream
Related
Published
2024-05-01T13:04:51.518Z
Modified
2026-03-13T07:52:03.639314Z
Summary
media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity
Details

In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-mem2mem: fix a memleak in v4l2m2mregister_entity

The entity->name (i.e. name) is allocated in v4l2m2mregister_entity but isn't freed in its following error-handling paths. This patch adds such deallocation to prevent memleak of entity->name.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27077.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
be2fff656322e82f215730839063c2c2ca73d14b
Fixed
3dd8abb0ed0e0a7c66d6d677c86ccb188cc39333
Fixed
0175f2d34c85744f9ad6554f696cf0afb5bd04e4
Fixed
afd2a82fe300032f63f8be5d6cd6981e75f8bbf2
Fixed
dc866b69cc51af9b8509b4731b8ce2a4950cd0ef
Fixed
0c9550b032de48d6a7fa6a4ddc09699d64d9300d
Fixed
90029b9c979b60de5cb2b70ade4bbf61d561bc5d
Fixed
5dc319cc3c4f7b74f7dfba349aa26f87efb52458
Fixed
9c23ef30e840fedc66948299509f6c2777c9cf4f
Fixed
8f94b49a5b5d386c038e355bef6347298aabd211

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27077.json"