In the Linux kernel, the following vulnerability has been resolved:
media: tc358743: register v4l2 async device only after successful setup
Ensure the device has been setup correctly before registering the v4l2
async device, thus allowing userspace to access.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 19:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 - Patch | |
| References | () https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 - Patch | |
| References | () https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 - Patch | |
| References | () https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 - Patch | |
| References | () https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d - Patch | |
| References | () https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a - Patch | |
| References | () https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 - Patch | |
| References | () https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 - Patch | |
| References | () https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory |
21 Nov 2024, 09:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24 - | |
| References | () https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7 - | |
| References | () https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7 - | |
| References | () https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02 - | |
| References | () https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d - | |
| References | () https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a - | |
| References | () https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496 - | |
| References | () https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6 - | |
| References | () https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468 - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
17 May 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 14:15
Updated : 2025-12-17 19:23
NVD link : CVE-2024-35830
Mitre link : CVE-2024-35830
CVE.ORG link : CVE-2024-35830
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
