In the Linux kernel, the following vulnerability has been resolved:
netsched: keep allochash updated after hash allocation
In commit 599be01ee567 ("netsched: fix an OOB access in clstcindex") I moved cp->hash calculation before the first tcindexallocperfecthash(), but cp->allochash is left untouched. This difference could lead to another out of bound access.
cp->allochash should always be the size allocated, we should update it after this tcindexallocperfecthash().