{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-27077","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.217Z","datePublished":"2024-05-01T13:04:51.518Z","dateUpdated":"2026-05-12T11:51:30.670Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:09:56.704Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity\n\nThe entity->name (i.e. name) is allocated in v4l2_m2m_register_entity\nbut isn't freed in its following error-handling paths. This patch\nadds such deallocation to prevent memleak of entity->name."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/v4l2-core/v4l2-mem2mem.c"],"versions":[{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"3dd8abb0ed0e0a7c66d6d677c86ccb188cc39333","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"0175f2d34c85744f9ad6554f696cf0afb5bd04e4","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"afd2a82fe300032f63f8be5d6cd6981e75f8bbf2","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"dc866b69cc51af9b8509b4731b8ce2a4950cd0ef","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"0c9550b032de48d6a7fa6a4ddc09699d64d9300d","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"90029b9c979b60de5cb2b70ade4bbf61d561bc5d","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"5dc319cc3c4f7b74f7dfba349aa26f87efb52458","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"9c23ef30e840fedc66948299509f6c2777c9cf4f","status":"affected","versionType":"git"},{"version":"be2fff656322e82f215730839063c2c2ca73d14b","lessThan":"8f94b49a5b5d386c038e355bef6347298aabd211","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/media/v4l2-core/v4l2-mem2mem.c"],"versions":[{"version":"4.19","status":"affected"},{"version":"0","lessThan":"4.19","status":"unaffected","versionType":"semver"},{"version":"4.19.311","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.273","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.214","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.153","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.83","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.23","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.11","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8.2","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"4.19.311"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.4.273"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.10.214"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.15.153"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.1.83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.6.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.7.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.8.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3dd8abb0ed0e0a7c66d6d677c86ccb188cc39333"},{"url":"https://git.kernel.org/stable/c/0175f2d34c85744f9ad6554f696cf0afb5bd04e4"},{"url":"https://git.kernel.org/stable/c/afd2a82fe300032f63f8be5d6cd6981e75f8bbf2"},{"url":"https://git.kernel.org/stable/c/dc866b69cc51af9b8509b4731b8ce2a4950cd0ef"},{"url":"https://git.kernel.org/stable/c/0c9550b032de48d6a7fa6a4ddc09699d64d9300d"},{"url":"https://git.kernel.org/stable/c/90029b9c979b60de5cb2b70ade4bbf61d561bc5d"},{"url":"https://git.kernel.org/stable/c/5dc319cc3c4f7b74f7dfba349aa26f87efb52458"},{"url":"https://git.kernel.org/stable/c/9c23ef30e840fedc66948299509f6c2777c9cf4f"},{"url":"https://git.kernel.org/stable/c/8f94b49a5b5d386c038e355bef6347298aabd211"}],"title":"media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:27:57.849Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/3dd8abb0ed0e0a7c66d6d677c86ccb188cc39333","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0175f2d34c85744f9ad6554f696cf0afb5bd04e4","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/afd2a82fe300032f63f8be5d6cd6981e75f8bbf2","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/dc866b69cc51af9b8509b4731b8ce2a4950cd0ef","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/0c9550b032de48d6a7fa6a4ddc09699d64d9300d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/90029b9c979b60de5cb2b70ade4bbf61d561bc5d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/5dc319cc3c4f7b74f7dfba349aa26f87efb52458","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/9c23ef30e840fedc66948299509f6c2777c9cf4f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8f94b49a5b5d386c038e355bef6347298aabd211","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-27077","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:43:52.226383Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:29.139Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:51:30.670Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}]}]},"dataVersion":"5.2"}