7.2
CWE
416
Advisory Published
CVE Published
Updated

CVE-2020-15436: Use After Free

First published: Mon Jun 08 2020(Updated: )

A use-after-free flaw was observed in blkdev_get(), in fs/block_dev.c after a call to __blkdev_get() fails, and its refcount gets freed/released. This problem may cause a denial of service problem with a special user privilege, and may even lead to a confidentiality issue.

Credit: securities@openeuler.org securities@openeuler.org securities@openeuler.org

Affected SoftwareAffected VersionHow to fix
redhat/kernel-rt<0:3.10.0-1160.15.2.rt56.1152.el7
0:3.10.0-1160.15.2.rt56.1152.el7
redhat/kernel<0:3.10.0-1160.15.2.el7
0:3.10.0-1160.15.2.el7
redhat/kernel-alt<0:4.14.0-115.35.1.el7a
0:4.14.0-115.35.1.el7a
redhat/kernel<0:3.10.0-957.72.1.el7
0:3.10.0-957.72.1.el7
redhat/kernel<0:3.10.0-1062.51.1.el7
0:3.10.0-1062.51.1.el7
debian/linux
5.10.223-1
5.10.226-1
6.1.123-1
6.1.128-1
6.12.12-1
6.12.15-1
Android
Linux Kernel>=2.6.38<4.4.229
Linux Kernel>=4.5<4.9.229
Linux Kernel>=4.10<4.14.186
Linux Kernel>=4.15<4.19.130
Linux Kernel>=4.20<5.4.49
Linux Kernel>=5.5<5.7.6
Brocade Fabric OS
netapp cloud backup
netapp solidfire \& hci management node
netapp solidfire baseboard management controller firmware
netapp solidfire baseboard management controller
netapp h410c firmware
netapp h410c
netapp h610c firmware
netapp h610c
netapp h610s firmware
netapp h610s
netapp h615c firmware
netapp h615c
NetApp AFF A700s Firmware
netapp a700s
NetApp AFF 8700
NetApp AFF 8700
NetApp FAS8700 Firmware
NetApp FAS8700
NetApp AFF 8300 Firmware
NetApp AFF 8300
NetApp FAS8300
NetApp FAS8300
NetApp AFF A400
NetApp AFF A400
netapp fabric-attached storage a400 firmware
netapp fabric-attached storage a400
netapp a250 firmware
netapp a250
netapp aff 500f firmware
netapp aff 500f
netapp fas 500f firmware
netapp fas 500f
All of
netapp solidfire baseboard management controller firmware
netapp solidfire baseboard management controller
All of
netapp h410c firmware
netapp h410c
All of
netapp h610c firmware
netapp h610c
All of
netapp h610s firmware
netapp h610s
All of
netapp h615c firmware
netapp h615c
All of
NetApp AFF A700s Firmware
netapp a700s
All of
NetApp AFF 8700
NetApp AFF 8700
All of
NetApp FAS8700 Firmware
NetApp FAS8700
All of
NetApp AFF 8300 Firmware
NetApp AFF 8300
All of
NetApp FAS8300
NetApp FAS8300
All of
NetApp AFF A400
NetApp AFF A400
All of
netapp fabric-attached storage a400 firmware
netapp fabric-attached storage a400
All of
netapp a250 firmware
netapp a250
All of
netapp aff 500f firmware
netapp aff 500f
All of
netapp fas 500f firmware
netapp fas 500f

Remedy

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2020-15436?

    CVE-2020-15436 is classified as a moderate severity vulnerability that can lead to denial of service and potential confidentiality issues.

  • How do I fix CVE-2020-15436?

    To fix CVE-2020-15436, update the affected kernel packages to the recommended versions or later, specifically the version 0:3.10.0-1160.15.2.rt56.1152.el7 or equivalent for your distribution.

  • Which systems are affected by CVE-2020-15436?

    CVE-2020-15436 affects various versions of the Linux kernel and specific configurations of the Red Hat kernel and kernel-rt.

  • What are the potential impacts of CVE-2020-15436?

    Exploiting CVE-2020-15436 may allow an attacker to cause a denial of service or potentially lead to unauthorized access to sensitive information.

  • Is there a specific user privilege required to exploit CVE-2020-15436?

    Yes, exploiting CVE-2020-15436 requires special user privileges, making it less likely for casual users to leverage this vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203