← Back to team overview

kernel-packages team mailing list archive

[Bug 1555353] Re: integer overflow in xt_alloc_table_info


Upstream proposed fix: http://marc.info/?l=netfilter-

** Information type changed from Private Security to Public Security

You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.

  integer overflow in xt_alloc_table_info

Status in linux package in Ubuntu:

Bug description:
  [From https://code.google.com/p/google-security-
  research/issues/detail?id=758 ]

  A recent refactoring cof this codepath
  introduced an integer overflow in xt_alloc_table_info, which on 32-bit
  systems can lead to small structure allocation and a copy_from_user
  based heap corruption.

  More specifically, the overflow may have been introduced in
  ; specifically the bit:

    +       size_t sz = sizeof(*info) + size;

  (where size is an unsigned int passed from userspace).

  This issue should only affect 32bit platforms (xt_table_info.size is
  an unsigned int).

To manage notifications about this bug go to: