diff options
author | 2024-11-08 01:51:30 +0200 | |
---|---|---|
committer | 2024-12-19 14:44:43 +0000 | |
commit | c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac (patch) | |
tree | d649f1f33400799acfc6e8e6e89f739f6fdc0887 | |
parent | media: uvcvideo: Fix crash during unbind if gpio unit is in use (diff) | |
download | linux-rng-c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac.tar.xz linux-rng-c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac.zip |
media: uvcvideo: Fix double free in error path
If the uvc_status_init() function fails to allocate the int_urb, it will
free the dev->status pointer but doesn't reset the pointer to NULL. This
results in the kfree() call in uvc_status_cleanup() trying to
double-free the memory. Fix it by resetting the dev->status pointer to
NULL after freeing it.
Fixes: a31a4055473b ("V4L/DVB:usbvideo:don't use part of buffer for USB transfer #4")
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20241107235130.31372-1-laurent.pinchart@ideasonboard.com
Signed-off-by: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
Reviewed by: Ricardo Ribalda <ribalda@chromium.org>
Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org>
-rw-r--r-- | drivers/media/usb/uvc/uvc_status.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/drivers/media/usb/uvc/uvc_status.c b/drivers/media/usb/uvc/uvc_status.c index 02c90acf6964..d269d163b579 100644 --- a/drivers/media/usb/uvc/uvc_status.c +++ b/drivers/media/usb/uvc/uvc_status.c @@ -269,6 +269,7 @@ int uvc_status_init(struct uvc_device *dev) dev->int_urb = usb_alloc_urb(0, GFP_KERNEL); if (!dev->int_urb) { kfree(dev->status); + dev->status = NULL; return -ENOMEM; } |