mirror of
https://github.com/opnsense/src.git
synced 2026-02-15 16:48:36 -05:00
The total size of the user-provided nmreq was first computed and then trusted during the copyin. This might lead to kernel memory corruption and escape from jails/containers. Reported by: Lucas Leong (@_wmliang_) of Trend Micro Zero Day Initiative Security: CVE-2022-23084 MFC after: 3 days |
||
|---|---|---|
| .. | ||
| if_ptnet.c | ||
| if_re_netmap.h | ||
| if_vtnet_netmap.h | ||
| netmap.c | ||
| netmap_bdg.c | ||
| netmap_bdg.h | ||
| netmap_freebsd.c | ||
| netmap_generic.c | ||
| netmap_kern.h | ||
| netmap_kloop.c | ||
| netmap_legacy.c | ||
| netmap_mbq.c | ||
| netmap_mbq.h | ||
| netmap_mem2.c | ||
| netmap_mem2.h | ||
| netmap_monitor.c | ||
| netmap_null.c | ||
| netmap_offloadings.c | ||
| netmap_pipe.c | ||
| netmap_vale.c | ||