From mboxrd@z Thu Jan 1 00:00:00 1970 From: Patrick McHardy Subject: Re: [PATCH] ipv4: netfilter: arp_tables: fix infoleak to userspace Date: Tue, 15 Mar 2011 13:35:51 +0100 Message-ID: <4D7F5D27.1080003@trash.net> References: <1299780728-32565-1-git-send-email-segoon@openwall.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 7bit Cc: linux-kernel@vger.kernel.org, security@kernel.org, "David S. Miller" , Alexey Kuznetsov , James Morris , Hideaki YOSHIFUJI , netfilter-devel@vger.kernel.org, netfilter@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org To: Vasiliy Kulikov Return-path: In-Reply-To: <1299780728-32565-1-git-send-email-segoon@openwall.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: netfilter-devel.vger.kernel.org On 10.03.2011 19:12, Vasiliy Kulikov wrote: > Structures ipt_replace, compat_ipt_replace, and xt_get_revision are > copied from userspace. Fields of these structs that are > zero-terminated strings are not checked. When they are used as argument > to a format string containing "%s" in request_module(), some sensitive > information is leaked to userspace via argument of spawned modprobe > process. > > The first bug was introduced before the git epoch; the second is > introduced by 6b7d31fc (v2.6.15-rc1); the third is introduced by > 6b7d31fc (v2.6.15-rc1). To trigger the bug one should have > CAP_NET_ADMIN. > Applied, thanks.