7.8
CVE-2020-36785
- EPSS 0.04%
 - Veröffentlicht 28.02.2024 09:15:36
 - Zuletzt bearbeitet 06.12.2024 15:59:06
 - Quelle 416baaa9-dc9f-4396-8d5f-8c081f
 - CVE-Watchlists
 - Unerledigt
 
In the Linux kernel, the following vulnerability has been resolved: media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() The "s3a_buf" is freed along with all the other items on the "asd->s3a_stats" list. It leads to a double free and a use after free.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
	Linux ≫ Linux Kernel  Version >= 5.8 < 5.10.37
	Linux ≫ Linux Kernel  Version >= 5.11 < 5.11.21
	Linux ≫ Linux Kernel  Version >= 5.12 < 5.12.4
| Typ | Quelle | Score | Percentile | 
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.073 | 
| Quelle | Base Score | Exploit Score | Impact Score | Vector String | 
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 | 
                 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H  
             | 
        
CWE-415 Double Free
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.