[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <164493721101.12867.17864293347718933449.git-patchwork-notify@kernel.org>
Date: Tue, 15 Feb 2022 15:00:11 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Oliver Neukum <oneukum@...e.com>
Cc: davem@...emloft.net, kuba@...nel.org, gregKH@...uxfoundation.org,
netdev@...r.kernel.org, linux-usb@...r.kernel.org
Subject: Re: [PATCH] CDC-NCM: avoid overflow in sanity checking
Hello:
This patch was applied to netdev/net.git (master)
by David S. Miller <davem@...emloft.net>:
On Tue, 15 Feb 2022 11:35:47 +0100 you wrote:
> A broken device may give an extreme offset like 0xFFF0
> and a reasonable length for a fragment. In the sanity
> check as formulated now, this will create an integer
> overflow, defeating the sanity check. Both offset
> and offset + len need to be checked in such a manner
> that no overflow can occur.
> And those quantities should be unsigned.
>
> [...]
Here is the summary with links:
- CDC-NCM: avoid overflow in sanity checking
https://git.kernel.org/netdev/net/c/8d2b1a1ec9f5
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists