CVE-2020-27820
Summary
| CVE | CVE-2020-27820 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-03 00:15:00 UTC |
| Updated | 2024-01-30 20:48:00 UTC |
| Description | A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver). |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| bugzilla.redhat.com/show_bug.cgi |
MISC |
bugzilla.redhat.com |
|
| [PATCH 3/3] drm/nouveau: clean up all clients on device removal - Jeremy Cline |
MISC |
lore.kernel.org |
|
| [PATCH 1/3] drm/nouveau: use drm_dev_unplug() during device removal - Jeremy Cline |
MISC |
lore.kernel.org |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| [PATCH 2/3] drm/nouveau: Add a dedicated mutex for the clients list - Jeremy Cline |
MISC |
lore.kernel.org |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| [PATCH 1/3] drm/nouveau: use drm_dev_unplug() during device removal - Jeremy Cline |
MISC |
lore.kernel.org |
|
| [PATCH 2/3] drm/nouveau: Add a dedicated mutex for the clients list - Jeremy Cline |
MISC |
lore.kernel.org |
|
| [PATCH 3/3] drm/nouveau: clean up all clients on device removal - Jeremy Cline |
MISC |
lore.kernel.org |
|
| Oracle Critical Patch Update Advisory - July 2022 |
N/A |
www.oracle.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159825 Oracle Enterprise Linux Security Update for kernel (ELSA-2022-1988)
- 198653 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5265-1)
- 198659 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-5278-1)
- 198785 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5415-1)
- 240275 Red Hat Update for kernel-rt (RHSA-2022:1975)
- 240298 Red Hat Update for kernel security (RHSA-2022:1988)
- 353141 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-010
- 353152 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-008
- 671448 EulerOS Security Update for kernel (EulerOS-SA-2022-1450)
- 671631 EulerOS Security Update for kernel (EulerOS-SA-2022-1661)
- 751590 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0056-1)
- 751600 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0068-1)
- 751602 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0080-1)
- 751622 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0131-1)
- 751654 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0197-1)
- 751695 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0367-1)
- 751697 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0366-1)
- 751701 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0366-1)
- 751702 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0371-1)
- 751989 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0131-1)
- 753264 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0079-1)
- 753355 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0056-1)
- 753441 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:14905-1)
- 940517 AlmaLinux Security Update for kernel (ALSA-2022:1988)