[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <175665260151.58639.6084959400627208281.b4-ty@narfation.org>
Date: Sun, 31 Aug 2025 17:06:38 +0200
From: Sven Eckelmann <sven@...fation.org>
To: netdev@...r.kernel.org,
Stanislav Fort <stanislav.fort@...le.com>
Cc: Sven Eckelmann <sven@...fation.org>,
Marek Lindner <marek.lindner@...lbox.org>,
Simon Wunderlich <sw@...onwunderlich.de>,
Antonio Quartulli <antonio@...delbit.com>,
"David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>,
Jakub Kicinski <kuba@...nel.org>,
Paolo Abeni <pabeni@...hat.com>,
Simon Horman <horms@...nel.org>,
b.a.t.m.a.n@...ts.open-mesh.org,
linux-kernel@...r.kernel.org,
disclosure@...le.com,
stable@...r.kernel.org
Subject: Re: [PATCH net v2] batman-adv: fix OOB read/write in network-coding decode
On Sun, 31 Aug 2025 16:56:23 +0200, Stanislav Fort wrote:
> batadv_nc_skb_decode_packet() trusts coded_len and checks only against
> skb->len. XOR starts at sizeof(struct batadv_unicast_packet), reducing
> payload headroom, and the source skb length is not verified, allowing an
> out-of-bounds read and a small out-of-bounds write.
>
> Validate that coded_len fits within the payload area of both destination
> and source sk_buffs before XORing.
>
> [...]
Applied, thanks!
[1/1] batman-adv: fix OOB read/write in network-coding decode
https://git.open-mesh.org/linux-merge.git/commit/?h=batadv/net&id=d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087
Best regards,
--
Sven Eckelmann <sven@...fation.org>
Powered by blists - more mailing lists