In the Linux kernel, the following vulnerability has been resolved:
netsched: keep allochash updated after hash allocation
In commit 599be01ee567 ("netsched: fix an OOB access in clstcindex") I moved cp->hash calculation before the first tcindexallocperfecthash(), but cp->allochash is left untouched. This difference could lead to another out of bound access.
cp->allochash should always be the size allocated, we should update it after this tcindexallocperfecthash().
[
{
"events": [
{
"introduced": "4.4.214"
},
{
"fixed": "4.4.218"
}
]
},
{
"events": [
{
"introduced": "4.9.214"
},
{
"fixed": "4.9.218"
}
]
},
{
"events": [
{
"introduced": "4.14.171"
},
{
"fixed": "4.14.175"
}
]
},
{
"events": [
{
"introduced": "4.19.103"
},
{
"fixed": "4.19.114"
}
]
},
{
"events": [
{
"introduced": "5.4.19"
},
{
"fixed": "5.4.29"
}
]
},
{
"events": [
{
"introduced": "5.5.3"
},
{
"fixed": "5.5.14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6-rc4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6-rc5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6-rc6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6-rc7"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-36791.json"