7.1

CVE-2020-36791

In the Linux kernel, the following vulnerability has been resolved:

net_sched: keep alloc_hash updated after hash allocation

In commit 599be01ee567 ("net_sched: fix an OOB access in cls_tcindex")
I moved cp->hash calculation before the first
tcindex_alloc_perfect_hash(), but cp->alloc_hash is left untouched.
This difference could lead to another out of bound access.

cp->alloc_hash should always be the size allocated, we should
update it after this tcindex_alloc_perfect_hash().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 4.4.214 < 4.4.218
LinuxLinux Kernel Version >= 4.9.214 < 4.9.218
LinuxLinux Kernel Version >= 4.14.171 < 4.14.175
LinuxLinux Kernel Version >= 4.19.103 < 4.19.114
LinuxLinux Kernel Version >= 5.4.19 < 5.4.29
LinuxLinux Kernel Version >= 5.5.3 < 5.5.14
LinuxLinux Kernel Version5.6 Updaterc1
LinuxLinux Kernel Version5.6 Updaterc2
LinuxLinux Kernel Version5.6 Updaterc3
LinuxLinux Kernel Version5.6 Updaterc4
LinuxLinux Kernel Version5.6 Updaterc5
LinuxLinux Kernel Version5.6 Updaterc6
LinuxLinux Kernel Version5.6 Updaterc7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.029
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.1 1.8 5.2
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CWE-125 Out-of-bounds Read

The product reads data past the end, or before the beginning, of the intended buffer.