Fwd: [scr1564375] your CVE ID requests

Tom Rini trini at konsulko.com
Tue Dec 26 15:51:21 CET 2023


On Tue, Dec 26, 2023 at 08:07:20AM +0300, sploitem wrote:
> ---------- Forwarded message ---------
> От: <cve-request at mitre.org>
> Date: вт, 19 дек. 2023 г. в 20:39
> Subject: Re: [scr1564375] your CVE ID requests
> To: <sploitem at gmail.com>
> Cc: <cve-request at mitre.org>
> 
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> 
> > [Suggested description]
> > Integer underflow in ipv6 net component when processing incoming packets.
> udp->udp_len is not verified before substruction leading to large number in
> len parameter (unsigned int). This can lead to DoS or code execution.

Would you please submit a patch to address the issue as well? Thanks.

-- 
Tom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 659 bytes
Desc: not available
URL: <https://lists.denx.de/pipermail/u-boot/attachments/20231226/4ef8e680/attachment.sig>


More information about the U-Boot mailing list