diff options
| author | Paul HENRYS <[email protected]> | 2025-10-09 17:43:28 +0200 |
|---|---|---|
| committer | Jerome Forissier <[email protected]> | 2025-10-22 14:28:33 +0200 |
| commit | 81e5708cc2c865df606e49aed5415adb2a662171 (patch) | |
| tree | e3ab086d516eb3d75920f01532d4146f8973e6cf /doc/develop | |
| parent | 34369d34e413ac32a131dd144b55ad04873e4854 (diff) | |
net: bootp: Prevent buffer overflow to avoid leaking the RAM content
CVE-2024-42040 describes a possible buffer overflow when calling
bootp_process_vendor() in bootp_handler() since the total length
of the packet is passed to bootp_process_vendor() without being
reduced to len-(offsetof(struct bootp_hdr,bp_vend)+4).
The packet length is also checked against its minimum size to avoid
reading data from struct bootp_hdr outside of the packet length.
Signed-off-by: Paul HENRYS <[email protected]>
Signed-off-by: Philippe Reynes <[email protected]>
Diffstat (limited to 'doc/develop')
0 files changed, 0 insertions, 0 deletions
