In the Linux kernel, the following vulnerability has been resolved:
net_sched: keep alloc_hash updated after hash allocation
In commit 599be01ee567 ("net_sched: fix an OOB access in cls_tcindex")
I moved cp->hash calculation before the first
tcindex_alloc_perfect_hash(), but cp->alloc_hash is left untouched.
This difference could lead to another out of bound access.
cp->alloc_hash should always be the size allocated, we should
update it after this tcindex_alloc_perfect_hash().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-05-07 14:15
Updated : 2025-11-10 17:34
NVD link : CVE-2020-36791
Mitre link : CVE-2020-36791
CVE.ORG link : CVE-2020-36791
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
