<div dir="ltr"><div>Applied to bionic and kinetic linux master-next</div><div><br></div><div>Thanks, <br></div><div>- Luke<br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Tue, Jan 31, 2023 at 4:15 PM Yuxuan Luo <<a href="mailto:yuxuan.luo@canonical.com">yuxuan.luo@canonical.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">[Impact]<br>
It is found that it is possible to bypass rndis_wlan's security checks through<br>
a vulnerability when given a large enough integer due to integer overflow,<br>
possessing a threat to rndis_wlan driver users devices' memory.<br>
<br>
[Backport]<br>
It is a clean cherry-pick.<br>
<br>
[Test]<br>
Compile and smoke tested by loading the module and checking the dmesg.<br>
<br>
[Potential Regression]<br>
This patch is local to rndis_wlan driver.<br>
<br>
Szymon Heidrich (1):<br>
wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid<br>
<br>
drivers/net/wireless/rndis_wlan.c | 19 ++++++-------------<br>
1 file changed, 6 insertions(+), 13 deletions(-)<br>
<br>
-- <br>
2.34.1<br>
<br>
<br>
-- <br>
kernel-team mailing list<br>
<a href="mailto:kernel-team@lists.ubuntu.com" target="_blank">kernel-team@lists.ubuntu.com</a><br>
<a href="https://lists.ubuntu.com/mailman/listinfo/kernel-team" rel="noreferrer" target="_blank">https://lists.ubuntu.com/mailman/listinfo/kernel-team</a><br>
</blockquote></div></div>