From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH 0/4] netfilter fixes for 3.4-rc7 Date: Wed, 16 May 2012 15:18:36 -0400 (EDT) Message-ID: <20120516.151836.786389543745557157.davem@davemloft.net> References: <1336996023-20249-1-git-send-email-pablo@netfilter.org> <20120514.185607.1967456974676336550.davem@davemloft.net> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: pablo@netfilter.org, netfilter-devel@vger.kernel.org, netdev@vger.kernel.org To: kadlec@blackhole.kfki.hu Return-path: Received: from shards.monkeyblade.net ([198.137.202.13]:52603 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753032Ab2EPTVr (ORCPT ); Wed, 16 May 2012 15:21:47 -0400 In-Reply-To: Sender: netfilter-devel-owner@vger.kernel.org List-ID: From: Jozsef Kadlecsik Date: Wed, 16 May 2012 20:41:51 +0200 (CEST) > Could at least the patch with the subject > > netfilter: ipset: fix hash size checking in kernel > > The hash size must fit both into u32 (jhash) and the max value of > size_t. The missing checking could lead to kernel crash, bug reported > by Seblu. > > be submitted into 3.4-rc7? Any non most-recent ipset package compiled with > gcc-4.7 or above can trigger the bug. And only root can trigger it if he gives bogus parameters right? If that's the case, the exposure is to privileged users committing an operator error, so I don't see it as so important.