| 概要 | In the Linux kernel, the following vulnerability has been resolved: can: gw: fix OOB heap access in cgw_csum_crc8_rel() cgw_csum_crc8_rel() correctly computes bounds-safe indices via calc_idx(): int from = calc_idx(crc8->from_idx, cf->len); if (from < 0 || to < 0 || res < 0) However, the loop and the result write then use the raw s8 fields directly for (i = crc8->from_idx; ...) /* BUG: raw negative index */ With from_idx = to_idx = result_idx = -64 on a 64-byte CAN FD frame, The companion function cgw_csum_xor_rel() uses `from`/`to`/`res` Confirmed with KASAN on linux-7.0-rc2: To configure the can-gw crc8 checksums CAP_NET_ADMIN is needed. |
|---|---|
| 公表日 | 2026年4月25日0:16 |
| 登録日 | 2026年4月25日4:07 |
| 最終更新日 | 2026年4月25日2:51 |