First published: Thu Feb 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=2.6.28<6.1.129 | |
Linux Kernel | >=6.2<6.6.76 | |
Linux Kernel | >=6.7<6.12.13 | |
Linux Kernel | >=6.13<6.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57980 is classified as a medium severity vulnerability affecting the Linux kernel.
To fix CVE-2024-57980, update the Linux kernel to the latest stable version that addresses this vulnerability.
CVE-2024-57980 affects Linux kernel versions between 2.6.28 and 6.1.129, as well as versions between 6.2 and 6.6.76, 6.7 and 6.12.13, and 6.13 and 6.13.2.
CVE-2024-57980 is a double free vulnerability in the uvcvideo driver that occurs when memory is improperly managed during error handling.
Yes, CVE-2024-57980 could potentially be exploited to cause system instability or denial of service.