Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2020-36776— thermal/drivers/cpufreq_cooling: Fix slab OOB issue

EPSS 0.02% · P5

Affected Version Matrix 14

VendorProductVersion RangeStatus
LinuxLinux371a3bc79c11b707d7a1b7a2c938dc3cc042fffb< c24a20912eef00587416628149c438e885eb1304affected
371a3bc79c11b707d7a1b7a2c938dc3cc042fffb< 876a5f33e5d961d879c5436987c09b3d9ef70379affected
371a3bc79c11b707d7a1b7a2c938dc3cc042fffb< 6bf443acf6ca4f666d0e4225614ba9993a3aa1a9affected
371a3bc79c11b707d7a1b7a2c938dc3cc042fffb< 34ab17cc6c2c1ac93d7e5d53bb972df9a968f085affected
39e0651cac9c80865b2838f297f95ffc0f34a1d8affected
febe56f21371ba1e51e8586c3ddf8f54fc62fe61affected
d3b7bacd1115400b94482dfc7efffc175c29b831affected
9006b543384ab10902819364c1205f11a1458571affected
… +6 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-36776

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
thermal/drivers/cpufreq_cooling: Fix slab OOB issue
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: thermal/drivers/cpufreq_cooling: Fix slab OOB issue Slab OOB issue is scanned by KASAN in cpu_power_to_freq(). If power is limited below the power of OPP0 in EM table, it will cause slab out-of-bound issue with negative array index. Return the lowest frequency if limited power cannot found a suitable OPP in EM table to fix this issue. Backtrace: [<ffffffd02d2a37f0>] die+0x104/0x5ac [<ffffffd02d2a5630>] bug_handler+0x64/0xd0 [<ffffffd02d288ce4>] brk_handler+0x160/0x258 [<ffffffd02d281e5c>] do_debug_exception+0x248/0x3f0 [<ffffffd02d284488>] el1_dbg+0x14/0xbc [<ffffffd02d75d1d4>] __kasan_report+0x1dc/0x1e0 [<ffffffd02d75c2e0>] kasan_report+0x10/0x20 [<ffffffd02d75def8>] __asan_report_load8_noabort+0x18/0x28 [<ffffffd02e6fce5c>] cpufreq_power2state+0x180/0x43c [<ffffffd02e6ead80>] power_actor_set_power+0x114/0x1d4 [<ffffffd02e6fac24>] allocate_power+0xaec/0xde0 [<ffffffd02e6f9f80>] power_allocator_throttle+0x3ec/0x5a4 [<ffffffd02e6ea888>] handle_thermal_trip+0x160/0x294 [<ffffffd02e6edd08>] thermal_zone_device_check+0xe4/0x154 [<ffffffd02d351cb4>] process_one_work+0x5e4/0xe28 [<ffffffd02d352f44>] worker_thread+0xa4c/0xfac [<ffffffd02d360124>] kthread+0x33c/0x358 [<ffffffd02d289940>] ret_from_fork+0xc/0x18
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于如果将功率限制在 EM 表中 OPP0 的功率以下,则会导致数组索引为负的板越界问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 371a3bc79c11b707d7a1b7a2c938dc3cc042fffb ~ c24a20912eef00587416628149c438e885eb1304 -
LinuxLinux 5.8 -

II. Public POCs for CVE-2020-36776

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-36776

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-02-27 · 67 CVEs total

CVE-2021-46951tpm: efi: Use local variable for calculating final log size
CVE-2021-46971perf/core: Fix unconditional security_locked_down() call
CVE-2021-46970bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
CVE-2021-46969bus: mhi: core: Fix invalid error returning in mhi_queue
CVE-2021-46957riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
CVE-2021-46956virtiofs: fix memory leak in virtio_fs_probe()
CVE-2021-46955openvswitch: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46954net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46953ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
CVE-2021-46952NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
CVE-2021-46958btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
CVE-2021-46950md/raid1: properly indicate failure when ending a failed write request
CVE-2021-46949sfc: farch: fix TX queue lookup in TX flush done handling
CVE-2021-46948sfc: farch: fix TX queue lookup in TX event handling
CVE-2021-46947sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues
CVE-2021-46945ext4: always panic when errors=panic is specified
CVE-2021-46944media: staging/intel-ipu3: Fix memory leak in imu_fmt
CVE-2021-46943media: staging/intel-ipu3: Fix set_fmt error handling
CVE-2021-46942io_uring: fix shared sqpoll cancellation hangs
CVE-2021-46941usb: dwc3: core: Do core softreset when switch mode

Showing top 20 of 67 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-36776

No comments yet


Leave a comment