In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: avoid a use-after-free when BO init fails
nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm_bo_init() invokes the provided
destructor which should de-initialize and free the memory.
Thus, when nouveau_bo_init() returns an error the gem object has already
been released and the memory freed by nouveau_bo_del_ttm().
References
Configurations
Configuration 1 (hide)
|
History
11 Dec 2024, 16:37
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/548f2ff8ea5e0ce767ae3418d1ec5308990be87d - Patch | |
References | () https://git.kernel.org/stable/c/bcf34aa5082ee2343574bc3f4d1c126030913e54 - Patch | |
References | () https://git.kernel.org/stable/c/f86e19d918a85492ad1a01fcdc0ad5ecbdac6f96 - Patch | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* |
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/548f2ff8ea5e0ce767ae3418d1ec5308990be87d - | |
References | () https://git.kernel.org/stable/c/bcf34aa5082ee2343574bc3f4d1c126030913e54 - | |
References | () https://git.kernel.org/stable/c/f86e19d918a85492ad1a01fcdc0ad5ecbdac6f96 - |
21 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 15:15
Updated : 2024-12-11 16:37
NVD link : CVE-2020-36788
Mitre link : CVE-2020-36788
CVE.ORG link : CVE-2020-36788
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free