2024-05-01 14:03:31 +00:00
{
"id" : "CVE-2024-27076" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-05-01T13:15:51.307" ,
2024-05-01 20:03:28 +00:00
"lastModified" : "2024-05-01T19:50:25.633" ,
"vulnStatus" : "Awaiting Analysis" ,
2024-05-01 14:03:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imx: csc/scaler: fix v4l2_ctrl_handler memory leak\n\nFree the memory allocated in v4l2_ctrl_handler_init on release."
2024-05-05 02:03:23 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: medios: imx: csc/scaler: corrige la p\u00e9rdida de memoria v4l2_ctrl_handler Libere la memoria asignada en v4l2_ctrl_handler_init en el lanzamiento."
2024-05-01 14:03:31 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://git.kernel.org/stable/c/42492b00156c03a79fd4851190aa63045d6a15ce" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/4797a3dd46f220e6d83daf54d70c5b33db6deb01" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/5d9fe604bf9b5b09d2215225df55f22a4cbbc684" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/6c92224721a439d6350db5933a1060768dcd565e" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/8c2e4efe1278cd2b230cdbf90a6cefbf00acc282" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/8df9a3c7044b847e9c4dc7e683fd64c6b873f328" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/b1d0eebaf87cc9ccd05f779ec4a0589f95d6c18b" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/d164ddc21e986dd9ad614b4b01746e5457aeb24f" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}