CVE-2024-57980

Source
https://cve.org/CVERecord?id=CVE-2024-57980
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57980.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57980
Downstream
Related
Published
2025-02-27T02:07:06.849Z
Modified
2026-03-12T02:18:35.180118Z
Summary
media: uvcvideo: Fix double free in error path
Details

In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix double free in error path

If the uvcstatusinit() function fails to allocate the inturb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvcstatus_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it.

Reviewed by: Ricardo Ribalda ribalda@chromium.org

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57980.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a31a4055473bf0a7b2b06cb2262347200d0711e1
Fixed
d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d
Fixed
87522ef165e5b6de8ef98cc318f3335166a1512c
Fixed
3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277
Fixed
9232719ac9ce4d5c213cebda23d72aec3e1c4c0d
Fixed
6c36dcd662ec5276782838660f8533a7cb26be49
Fixed
d1f8e69eec91d5a75ef079778a5d0151db2a7f22
Fixed
d8e63dd7b6683969d3d47c7b8e9635f96d554ad4
Fixed
c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57980.json"