CVE-2024-27078 - Missing Release of Memory after Effective Lifetime

Severity

55%

Complexity

18%

Confidentiality

60%

In the Linux kernel, the following vulnerability has been resolved: media: v4l2-tpg: fix some memleaks in tpg_alloc In tpg_alloc, resources should be deallocated in each and every error-handling paths, since they are allocated in for statements. Otherwise there would be memleaks because tpg_free is called only when tpg_alloc return 0.

CVSS 3.1 Base Score 5.5. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).

Demo Examples

Missing Release of Memory after Effective Lifetime

CWE-401

The following C function leaks a block of allocated memory if the call to read() does not return the expected number of bytes:


               
}
return buf;
return NULL;
return NULL;

Overview

First reported 9 months ago

2024-05-01 13:15:00

Last updated 1 month ago

2024-12-23 14:34:00

Affected Software

Linux Kernel

References

https://git.kernel.org/stable/c/0de691ff547d86dd54c24b40a81f9c925df8dd77

https://git.kernel.org/stable/c/8269ab16415f2065cd792c49b0475543936cbd79

https://git.kernel.org/stable/c/94303a06e1852a366e9671fff46d19459f88cb28

https://git.kernel.org/stable/c/770a57922ce36a8476c43f7400b6501c554ea511

https://git.kernel.org/stable/c/6bf5c2fade8ed53b2d26fa9875e5b04f36c7145d

https://git.kernel.org/stable/c/4c86c772fef06f5d7a66151bac42366825db0941

https://git.kernel.org/stable/c/31096da07933598da8522c54bd007376fb152a09

https://git.kernel.org/stable/c/622b1cf38521569869c8f7b9fbe9e4f1a289add7

https://git.kernel.org/stable/c/8cf9c5051076e0eb958f4361d50d8b0c3ee6691c

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

https://git.kernel.org/stable/c/0de691ff547d86dd54c24b40a81f9c925df8dd77

Patch

https://git.kernel.org/stable/c/31096da07933598da8522c54bd007376fb152a09

Patch

https://git.kernel.org/stable/c/4c86c772fef06f5d7a66151bac42366825db0941

Patch

https://git.kernel.org/stable/c/622b1cf38521569869c8f7b9fbe9e4f1a289add7

Patch

https://git.kernel.org/stable/c/6bf5c2fade8ed53b2d26fa9875e5b04f36c7145d

Patch

https://git.kernel.org/stable/c/770a57922ce36a8476c43f7400b6501c554ea511

Patch

https://git.kernel.org/stable/c/8269ab16415f2065cd792c49b0475543936cbd79

Patch

https://git.kernel.org/stable/c/8cf9c5051076e0eb958f4361d50d8b0c3ee6691c

Patch

https://git.kernel.org/stable/c/94303a06e1852a366e9671fff46d19459f88cb28

Patch

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

Mailing List

https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Mailing List

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.