Количество 20
Количество 20
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
CVE-2024-57980
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: m ...
GHSA-2mg6-cgrh-mg4j
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
BDU:2025-10241
Уязвимость функции uvc_status_init() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
RLSA-2025:11428
Important: kernel security update
ELSA-2025-11428
ELSA-2025-11428: kernel security update (IMPORTANT)
RLSA-2025:11298
Moderate: kernel security update
ELSA-2025-11298
ELSA-2025-11298: kernel security update (MODERATE)
ELSA-2025-14748
ELSA-2025-14748: kernel security update (IMPORTANT)
ELSA-2025-11861
ELSA-2025-11861: kernel security update (MODERATE)
SUSE-SU-2025:01600-1
Security update for the Linux Kernel
SUSE-SU-2025:1177-1
Security update for the Linux Kernel
SUSE-SU-2025:1180-1
Security update for the Linux Kernel
SUSE-SU-2025:1178-1
Security update for the Linux Kernel
SUSE-SU-2025:01919-1
Security update for the Linux Kernel
ELSA-2025-20530
ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20480
ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org> | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org> | CVSS3: 4.7 | 0% Низкий | 8 месяцев назад | |
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org> | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | ||
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: m ... | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
GHSA-2mg6-cgrh-mg4j In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org> | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
BDU:2025-10241 Уязвимость функции uvc_status_init() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации | CVSS3: 7.8 | 0% Низкий | 12 месяцев назад | |
RLSA-2025:11428 Important: kernel security update | около 1 месяца назад | |||
ELSA-2025-11428 ELSA-2025-11428: kernel security update (IMPORTANT) | 4 месяца назад | |||
RLSA-2025:11298 Moderate: kernel security update | 3 месяца назад | |||
ELSA-2025-11298 ELSA-2025-11298: kernel security update (MODERATE) | 4 месяца назад | |||
ELSA-2025-14748 ELSA-2025-14748: kernel security update (IMPORTANT) | около 2 месяцев назад | |||
ELSA-2025-11861 ELSA-2025-11861: kernel security update (MODERATE) | 3 месяца назад | |||
SUSE-SU-2025:01600-1 Security update for the Linux Kernel | 6 месяцев назад | |||
SUSE-SU-2025:1177-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:1180-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:1178-1 Security update for the Linux Kernel | 7 месяцев назад | |||
SUSE-SU-2025:01919-1 Security update for the Linux Kernel | 5 месяцев назад | |||
ELSA-2025-20530 ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-20480 ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT) | 4 месяца назад |
Уязвимостей на страницу