CVE-2020-36785

In the Linux kernel, the following vulnerability has been resolved: media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() The "s3a_buf" is freed along with all the other items on the "asd->s3a_stats" list. It leads to a double free and a use after free.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Dec 2024, 15:59

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba - () https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba - Patch
References () https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045 - () https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045 - Patch
References () https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d - () https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d - Patch
References () https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193 - () https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CWE-415
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

Information

Published : 2024-02-28 09:15

Updated : 2024-12-06 15:59


NVD link : CVE-2020-36785

Mitre link : CVE-2020-36785

CVE.ORG link : CVE-2020-36785


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free

CWE-416

Use After Free