CVE-2020-36776

In the Linux kernel, the following vulnerability has been resolved: thermal/drivers/cpufreq_cooling: Fix slab OOB issue Slab OOB issue is scanned by KASAN in cpu_power_to_freq(). If power is limited below the power of OPP0 in EM table, it will cause slab out-of-bound issue with negative array index. Return the lowest frequency if limited power cannot found a suitable OPP in EM table to fix this issue. Backtrace: [<ffffffd02d2a37f0>] die+0x104/0x5ac [<ffffffd02d2a5630>] bug_handler+0x64/0xd0 [<ffffffd02d288ce4>] brk_handler+0x160/0x258 [<ffffffd02d281e5c>] do_debug_exception+0x248/0x3f0 [<ffffffd02d284488>] el1_dbg+0x14/0xbc [<ffffffd02d75d1d4>] __kasan_report+0x1dc/0x1e0 [<ffffffd02d75c2e0>] kasan_report+0x10/0x20 [<ffffffd02d75def8>] __asan_report_load8_noabort+0x18/0x28 [<ffffffd02e6fce5c>] cpufreq_power2state+0x180/0x43c [<ffffffd02e6ead80>] power_actor_set_power+0x114/0x1d4 [<ffffffd02e6fac24>] allocate_power+0xaec/0xde0 [<ffffffd02e6f9f80>] power_allocator_throttle+0x3ec/0x5a4 [<ffffffd02e6ea888>] handle_thermal_trip+0x160/0x294 [<ffffffd02e6edd08>] thermal_zone_device_check+0xe4/0x154 [<ffffffd02d351cb4>] process_one_work+0x5e4/0xe28 [<ffffffd02d352f44>] worker_thread+0xa4c/0xfac [<ffffffd02d360124>] kthread+0x33c/0x358 [<ffffffd02d289940>] ret_from_fork+0xc/0x18
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:30

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/34ab17cc6c2c1ac93d7e5d53bb972df9a968f085 - Patch () https://git.kernel.org/stable/c/34ab17cc6c2c1ac93d7e5d53bb972df9a968f085 - Patch
References () https://git.kernel.org/stable/c/6bf443acf6ca4f666d0e4225614ba9993a3aa1a9 - Patch () https://git.kernel.org/stable/c/6bf443acf6ca4f666d0e4225614ba9993a3aa1a9 - Patch
References () https://git.kernel.org/stable/c/876a5f33e5d961d879c5436987c09b3d9ef70379 - Patch () https://git.kernel.org/stable/c/876a5f33e5d961d879c5436987c09b3d9ef70379 - Patch
References () https://git.kernel.org/stable/c/c24a20912eef00587416628149c438e885eb1304 - Patch () https://git.kernel.org/stable/c/c24a20912eef00587416628149c438e885eb1304 - Patch

10 Apr 2024, 19:34

Type Values Removed Values Added
CWE CWE-129
References () https://git.kernel.org/stable/c/34ab17cc6c2c1ac93d7e5d53bb972df9a968f085 - () https://git.kernel.org/stable/c/34ab17cc6c2c1ac93d7e5d53bb972df9a968f085 - Patch
References () https://git.kernel.org/stable/c/6bf443acf6ca4f666d0e4225614ba9993a3aa1a9 - () https://git.kernel.org/stable/c/6bf443acf6ca4f666d0e4225614ba9993a3aa1a9 - Patch
References () https://git.kernel.org/stable/c/876a5f33e5d961d879c5436987c09b3d9ef70379 - () https://git.kernel.org/stable/c/876a5f33e5d961d879c5436987c09b3d9ef70379 - Patch
References () https://git.kernel.org/stable/c/c24a20912eef00587416628149c438e885eb1304 - () https://git.kernel.org/stable/c/c24a20912eef00587416628149c438e885eb1304 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2024-11-21 05:30


NVD link : CVE-2020-36776

Mitre link : CVE-2020-36776

CVE.ORG link : CVE-2020-36776


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index