| Summary | In the Linux kernel, the following vulnerability has been resolved: can: gw: fix OOB heap access in cgw_csum_crc8_rel() cgw_csum_crc8_rel() correctly computes bounds-safe indices via calc_idx(): int from = calc_idx(crc8->from_idx, cf->len); if (from < 0 || to < 0 || res < 0) However, the loop and the result write then use the raw s8 fields directly for (i = crc8->from_idx; ...) /* BUG: raw negative index */ With from_idx = to_idx = result_idx = -64 on a 64-byte CAN FD frame, The companion function cgw_csum_xor_rel() uses `from`/`to`/`res` Confirmed with KASAN on linux-7.0-rc2: To configure the can-gw crc8 checksums CAP_NET_ADMIN is needed. |
|---|---|
| Publication Date | April 25, 2026, 12:16 a.m. |
| Registration Date | April 25, 2026, 4:07 a.m. |
| Last Update | April 25, 2026, 2:51 a.m. |