diff options
| author | Marc Kleine-Budde <[email protected]> | 2025-09-19 17:03:04 +0000 |
|---|---|---|
| committer | Marc Kleine-Budde <[email protected]> | 2025-09-19 17:03:04 +0000 |
| commit | a3ed215cb2147e98981de5321fd1b1d0e3dceb1c (patch) | |
| tree | 8923133766c3ea2091b46a8f4d7b07209e51a94b /lib/notifier-error-inject.c | |
| parent | can: rcar_canfd: Fix controller mode setting (diff) | |
| parent | can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (diff) | |
| download | kernel-a3ed215cb2147e98981de5321fd1b1d0e3dceb1c.tar.gz kernel-a3ed215cb2147e98981de5321fd1b1d0e3dceb1c.zip | |
Merge patch series "can: populate ndo_change_mtu() to prevent buffer overflow"
Vincent Mailhol <[email protected]> says:
Four drivers, namely etas_es58x, hi311x, sun4i_can and mcba_usb forgot
to populate their net_device_ops->ndo_change_mtu(). Because of that,
the user is free to configure any MTU on these interfaces.
This can be abused by an attacker who could craft some skbs and send
them through PF_PACKET to perform a buffer overflow of up to 247 bytes
in each of these drivers.
This series contains four patches, one for each of the drivers, to add
the missing ndo_change_mtu() callback. The descriptions contain
detailed explanations of how the buffer overflow could be triggered.
Link: https://patch.msgid.link/[email protected]
Signed-off-by: Marc Kleine-Budde <[email protected]>
Diffstat (limited to 'lib/notifier-error-inject.c')
0 files changed, 0 insertions, 0 deletions
