๐Ÿ” CVE Alert

CVE-2024-58079

UNKNOWN 0.0

media: uvcvideo: Fix crash during unbind if gpio unit is in use

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix crash during unbind if gpio unit is in use We used the wrong device for the device managed functions. We used the usb device, when we should be using the interface device. If we unbind the driver from the usb interface, the cleanup functions are never called. In our case, the IRQ is never disabled. If an IRQ is triggered, it will try to access memory sections that are already free, causing an OOPS. We cannot use the function devm_request_threaded_irq here. The devm_* clean functions may be called after the main structure is released by uvc_delete. Luckily this bug has small impact, as it is only affected by devices with gpio units and the user has to unbind the device, a disconnect will not trigger this error.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 6, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2886477ff98740cc3333cf785e4de0b1ff3d7a28 < 0fdd7cc593385e46e92e180b71e264fc9c195298 2886477ff98740cc3333cf785e4de0b1ff3d7a28 < 3c00e94d00ca079bef7906d6f39d1091bccfedd3 2886477ff98740cc3333cf785e4de0b1ff3d7a28 < 0b5e0445bc8384c18bd35cb9fe87f6258c6271d9 2886477ff98740cc3333cf785e4de0b1ff3d7a28 < d2eac8b14ac690aa73052aa6d4ba69005715367e 2886477ff98740cc3333cf785e4de0b1ff3d7a28 < 5d2e65cbe53d0141ed095cf31c2dcf3d8668c11d 2886477ff98740cc3333cf785e4de0b1ff3d7a28 < a9ea1a3d88b7947ce8cadb2afceee7a54872bbc5
Linux / Linux
5.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0fdd7cc593385e46e92e180b71e264fc9c195298 git.kernel.org: https://git.kernel.org/stable/c/3c00e94d00ca079bef7906d6f39d1091bccfedd3 git.kernel.org: https://git.kernel.org/stable/c/0b5e0445bc8384c18bd35cb9fe87f6258c6271d9 git.kernel.org: https://git.kernel.org/stable/c/d2eac8b14ac690aa73052aa6d4ba69005715367e git.kernel.org: https://git.kernel.org/stable/c/5d2e65cbe53d0141ed095cf31c2dcf3d8668c11d git.kernel.org: https://git.kernel.org/stable/c/a9ea1a3d88b7947ce8cadb2afceee7a54872bbc5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html