[PATCH] net: bootp: Prevent buffer overflow to avoid leaking the RAM content
    Philippe Reynes 
    philippe.reynes at softathome.com
       
    Thu Oct  9 17:45:45 CEST 2025
    
    
  
Hi Fabio,
Le 09/10/2025 à 14:16, Fabio Estevam a écrit :
> This Mail comes from Outside of SoftAtHome: Do not answer, click links or open attachments unless you recognize the sender and know the content is safe.
>
> Hi Philippe,
>
> On Thu, Oct 9, 2025 at 6:27 AM Philippe Reynes
> <philippe.reynes at softathome.com> wrote:
>> From: Paul HENRYS <paul.henrys_ext at softathome.com>
>>
>> CVE-2024-42040 describes a possible buffer overflow when calling
>> bootp_process_vendor() in bootp_handler() since the total length
>> of the packet is passed to bootp_process_vendor() without being
>> reduced to len-(offsetof(struct bootp_hdr,bp_vend)+4).
>>
>> The packet length is also checked against its minimum size to avoid
>> reading data from struct bootp_hdr outside of the packet length.
>>
>> From: Paul HENRYS <paul.henrys_ext at softathome.com>
> You don't need to duplicate the From line here.
ok, I have removed it in the v2
>
>> Signed-off-by: Paul HENRYS <paul.henrys_ext at softathome.com>
> You missed your Signed-off-by tag.
ok, I have added it in the v2
Thanks for the feedback,
Regards,
Philippe
    
    
More information about the U-Boot
mailing list