[PATCH] net: bootp: Prevent buffer overflow to avoid leaking the RAM content

Fabio Estevam festevam at gmail.com
Thu Oct 9 14:16:42 CEST 2025


Hi Philippe,

On Thu, Oct 9, 2025 at 6:27 AM Philippe Reynes
<philippe.reynes at softathome.com> wrote:
>
> From: Paul HENRYS <paul.henrys_ext at softathome.com>
>
> CVE-2024-42040 describes a possible buffer overflow when calling
> bootp_process_vendor() in bootp_handler() since the total length
> of the packet is passed to bootp_process_vendor() without being
> reduced to len-(offsetof(struct bootp_hdr,bp_vend)+4).
>
> The packet length is also checked against its minimum size to avoid
> reading data from struct bootp_hdr outside of the packet length.
>
> From: Paul HENRYS <paul.henrys_ext at softathome.com>

You don't need to duplicate the From line here.

> Signed-off-by: Paul HENRYS <paul.henrys_ext at softathome.com>

You missed your Signed-off-by tag.


More information about the U-Boot mailing list