From mboxrd@z Thu Jan 1 00:00:00 1970 From: Pablo Neira Ayuso Subject: Re: [PATCH 1/1] netfilter: cttimeout: fix buffer overflow Date: Wed, 21 Nov 2012 23:54:36 +0100 Message-ID: <20121121225436.GB19941@1984> References: <1353497858-29404-1-git-send-email-fw@strlen.de> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: netfilter-devel , netdev To: Florian Westphal Return-path: Received: from mail.us.es ([193.147.175.20]:55076 "EHLO mail.us.es" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932263Ab2KVUlU (ORCPT ); Thu, 22 Nov 2012 15:41:20 -0500 Content-Disposition: inline In-Reply-To: <1353497858-29404-1-git-send-email-fw@strlen.de> Sender: netfilter-devel-owner@vger.kernel.org List-ID: On Wed, Nov 21, 2012 at 12:37:38PM +0100, Florian Westphal wrote: > Chen Gang reports: > the length of nla_data(cda[CTA_TIMEOUT_NAME]) is not limited in server side. > > And indeed, its used to strcpy to a fixed-sized buffer. > > Fortunately, nfnetlink users need CAP_NET_ADMIN. Good catch, applied thanks.