CVE-2020-36785

In the Linux kernel, the following vulnerability has been resolved: media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() The "s3a_buf" is freed along with all the other items on the "asd->s3a_stats" list. It leads to a double free and a use after free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Dec 2024, 15:59

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba - () https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba - Patch
References () https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045 - () https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045 - Patch
References () https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d - () https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d - Patch
References () https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193 - () https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CWE-415
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 05:30

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: medios: atomisp: Corrige el use after free en atomisp_alloc_css_stat_bufs() El "s3a_buf" se libera junto con todos los demás elementos de la lista "asd->s3a_stats". Conduce a una doble gratuidad y un use after free.
References () https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba - () https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba -
References () https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045 - () https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045 -
References () https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d - () https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d -
References () https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193 - () https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193 -

28 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-28 09:15

Updated : 2024-12-06 15:59


NVD link : CVE-2020-36785

Mitre link : CVE-2020-36785

CVE.ORG link : CVE-2020-36785


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free

CWE-416

Use After Free