From mboxrd@z Thu Jan 1 00:00:00 1970 From: Patrick McHardy Subject: Re: [PATCH] ipv4: netfilter: ip_tables: fix infoleak to userspace Date: Tue, 15 Mar 2011 13:36:31 +0100 Message-ID: <4D7F5D4F.7030703@trash.net> References: <1299780735-32607-1-git-send-email-segoon@openwall.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 7bit Cc: linux-kernel@vger.kernel.org, security@kernel.org, "David S. Miller" , Alexey Kuznetsov , James Morris , Hideaki YOSHIFUJI , netfilter-devel@vger.kernel.org, netfilter@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org To: Vasiliy Kulikov Return-path: In-Reply-To: <1299780735-32607-1-git-send-email-segoon@openwall.com> Sender: netfilter-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On 10.03.2011 19:12, Vasiliy Kulikov wrote: > Structures ipt_replace, compat_ipt_replace, and xt_get_revision are > copied from userspace. Fields of these structs that are > zero-terminated strings are not checked. When they are used as argument > to a format string containing "%s" in request_module(), some sensitive > information is leaked to userspace via argument of spawned modprobe > process. > > The first and the third bugs were introduced before the git epoch; the > second was introduced in 2722971c (v2.6.17-rc1). To trigger the bug > one should have CAP_NET_ADMIN. Applied, thanks.