Количество 20
Количество 20
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
CVE-2024-57980
CVE-2024-57980
In the Linux kernel, the following vulnerability has been resolved: m ...
GHSA-2mg6-cgrh-mg4j
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
BDU:2025-10241
Уязвимость функции uvc_status_init() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
RLSA-2025:11428
Important: kernel security update
ELSA-2025-11428
ELSA-2025-11428: kernel security update (IMPORTANT)
RLSA-2025:11298
Moderate: kernel security update
ELSA-2025-11298
ELSA-2025-11298: kernel security update (MODERATE)
ELSA-2025-14748
ELSA-2025-14748: kernel security update (IMPORTANT)
ELSA-2025-11861
ELSA-2025-11861: kernel security update (MODERATE)
SUSE-SU-2025:01600-1
Security update for the Linux Kernel
SUSE-SU-2025:1177-1
Security update for the Linux Kernel
SUSE-SU-2025:1180-1
Security update for the Linux Kernel
SUSE-SU-2025:1178-1
Security update for the Linux Kernel
SUSE-SU-2025:01919-1
Security update for the Linux Kernel
ELSA-2025-20530
ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20480
ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>  | CVSS3: 7.8  | 0% Низкий | 8 месяцев назад | |
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>  | CVSS3: 4.7  | 0% Низкий | 8 месяцев назад | |
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>  | CVSS3: 7.8  | 0% Низкий | 8 месяцев назад | |
CVSS3: 7.8  | 0% Низкий | 8 месяцев назад | ||
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: m ...  | CVSS3: 7.8  | 0% Низкий | 8 месяцев назад | |
GHSA-2mg6-cgrh-mg4j In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer to NULL. This results in the kfree() call in uvc_status_cleanup() trying to double-free the memory. Fix it by resetting the dev->status pointer to NULL after freeing it. Reviewed by: Ricardo Ribalda <ribalda@chromium.org>  | CVSS3: 7.8  | 0% Низкий | 8 месяцев назад | |
BDU:2025-10241 Уязвимость функции uvc_status_init() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации  | CVSS3: 7.8  | 0% Низкий | 12 месяцев назад | |
RLSA-2025:11428 Important: kernel security update  | около 1 месяца назад | |||
ELSA-2025-11428 ELSA-2025-11428: kernel security update (IMPORTANT)  | 4 месяца назад | |||
RLSA-2025:11298 Moderate: kernel security update  | 3 месяца назад | |||
ELSA-2025-11298 ELSA-2025-11298: kernel security update (MODERATE)  | 4 месяца назад | |||
ELSA-2025-14748 ELSA-2025-14748: kernel security update (IMPORTANT)  | около 2 месяцев назад | |||
ELSA-2025-11861 ELSA-2025-11861: kernel security update (MODERATE)  | 3 месяца назад | |||
SUSE-SU-2025:01600-1 Security update for the Linux Kernel  | 6 месяцев назад | |||
SUSE-SU-2025:1177-1 Security update for the Linux Kernel  | 7 месяцев назад | |||
SUSE-SU-2025:1180-1 Security update for the Linux Kernel  | 7 месяцев назад | |||
SUSE-SU-2025:1178-1 Security update for the Linux Kernel  | 7 месяцев назад | |||
SUSE-SU-2025:01919-1 Security update for the Linux Kernel  | 5 месяцев назад | |||
ELSA-2025-20530 ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)  | 3 месяца назад | |||
ELSA-2025-20480 ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)  | 4 месяца назад | 
Уязвимостей на страницу