In the Linux kernel, the following vulnerability has been resolved:
media: vidtv: initialize local pointers upon transfer of memory ownership
vidtvchannelsiinit() creates a temporary list (program, service, event) and ownership of the memory itself is transferred to the PAT/SDT/EIT tables through vidtvpsipatprogramassign(), vidtvpsisdtserviceassign(), vidtvpsieitevent_assign().
The problem here is that the local pointer where the memory ownership transfer was completed is not initialized to NULL. This causes the vidtvpsipmtcreatesecforeachpatentry() function to fail, and in the flow that jumps to freeeit, the memory that was freed by vidtvpsi*tabledestroy() can be accessed again by vidtvpsi*event_destroy() due to the uninitialized local pointer, so it is freed once again.
Therefore, to prevent use-after-free and double-free vulnerability, local pointers must be initialized to NULL when transferring memory ownership.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68808.json"
}