{"id":"CVE-2024-57904","summary":"iio: adc: at91: call input_free_device() on allocated iio_dev","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: at91: call input_free_device() on allocated iio_dev\n\nCurrent implementation of at91_ts_register() calls input_free_deivce()\non st-\u003ets_input, however, the err label can be reached before the\nallocated iio_dev is stored to st-\u003ets_input. Thus call\ninput_free_device() on input instead of st-\u003ets_input.","modified":"2026-04-02T12:25:22.732994Z","published":"2025-01-19T11:52:28.982Z","related":["MGASA-2025-0030","MGASA-2025-0032","SUSE-SU-2025:0289-1","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7379-2","USN-7380-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57904.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/028a1ba8e3bae593d701aee4f690ce7c195b67d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/09e067e3c83e0695d338e8a26916e3c2bc44be02"},{"type":"WEB","url":"https://git.kernel.org/stable/c/25ef52f1c15db67d890b80203a911b9a57b0bf71"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac8d932e3214c10ec641ad45a253929a596ead62"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b549c90bfe66f704878aa1e57b30ba15dab71935"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d115b7f3ddc03b38bb7e8754601556fe9b4fc034"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de6a73bad1743e9e81ea5a24c178c67429ff510b"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57904.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-57904"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"84882b060301c35ab7e2c1ef355b0bd06b764195"},{"fixed":"b549c90bfe66f704878aa1e57b30ba15dab71935"},{"fixed":"ac8d932e3214c10ec641ad45a253929a596ead62"},{"fixed":"028a1ba8e3bae593d701aee4f690ce7c195b67d6"},{"fixed":"25ef52f1c15db67d890b80203a911b9a57b0bf71"},{"fixed":"09e067e3c83e0695d338e8a26916e3c2bc44be02"},{"fixed":"d115b7f3ddc03b38bb7e8754601556fe9b4fc034"},{"fixed":"de6a73bad1743e9e81ea5a24c178c67429ff510b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57904.json"}}],"schema_version":"1.7.5"}