Description
In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix OOB read/write in network-coding decode batadv_nc_skb_decode_packet() trusts coded_len and checks only against skb->len. XOR starts at sizeof(struct batadv_unicast_packet), reducing payload headroom, and the source skb length is not verified, allowing an out-of-bounds read and a small out-of-bounds write. Validate that coded_len fits within the payload area of both destination and source sk_buffs before XORing.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
- Attack Vector
- local
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- none
- Availability
- high
- Weaknesses
- CWE-125
Metadata
- Primary Vendor
- LINUX
- Published
- 9/19/2025
- Last Modified
- 1/20/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
linux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kernellinux : linux_kerneldebian : debian_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.