In the Linux kernel, the following vulnerability has been resolved:
drm/nouveau: avoid a use-after-free when BO init fails
nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm_bo_init() invokes the provided
destructor which should de-initialize and free the memory.
Thus, when nouveau_bo_init() returns an error the gem object has already
been released and the memory freed by nouveau_bo_del_ttm().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-05-21 15:15
Updated : 2024-12-11 16:37
NVD link : CVE-2020-36788
Mitre link : CVE-2020-36788
CVE.ORG link : CVE-2020-36788
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
