CVE-2020-36791

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
07/05/2025
Last modified:
10/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net_sched: keep alloc_hash updated after hash allocation<br /> <br /> In commit 599be01ee567 ("net_sched: fix an OOB access in cls_tcindex")<br /> I moved cp-&gt;hash calculation before the first<br /> tcindex_alloc_perfect_hash(), but cp-&gt;alloc_hash is left untouched.<br /> This difference could lead to another out of bound access.<br /> <br /> cp-&gt;alloc_hash should always be the size allocated, we should<br /> update it after this tcindex_alloc_perfect_hash().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.4.214 (including) 4.4.218 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9.214 (including) 4.9.218 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.14.171 (including) 4.14.175 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.19.103 (including) 4.19.114 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.19 (including) 5.4.29 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5.3 (including) 5.5.14 (excluding)
cpe:2.3:o:linux:linux_kernel:5.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.6:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.6:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.6:rc7:*:*:*:*:*:*