diff options
author | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2016-03-08 20:29:10 +0100 |
---|---|---|
committer | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2016-03-08 20:29:10 +0100 |
commit | 367e198805de5027da779ab86cebd4a2c69c75d8 (patch) | |
tree | 16b0f5183b451b174696fee7b571e0a1274e5aa4 /tests/macipmap.t.list2 | |
parent | 7dcaf666bbc8290f8eb0eb3ec4dd0c5631020347 (diff) |
netfilter: ipset: Check IPSET_ATTR_ETHER netlink attribute length
Julia Lawall pointed out that IPSET_ATTR_ETHER netlink attribute length
was not checked explicitly, just for the maximum possible size. Malicious
netlink clients could send shorter attribute and thus resulting a kernel
read after the buffer.
The patch adds the explicit length checkings.
Reported-by: Julia Lawall <julia.lawall@lip6.fr>
Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Diffstat (limited to 'tests/macipmap.t.list2')
0 files changed, 0 insertions, 0 deletions