[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20180106225212.s3xa7disqmsfw7ob@salvia>
Date: Sat, 6 Jan 2018 23:52:12 +0100
From: Pablo Neira Ayuso <pablo@...filter.org>
To: Dmitry Vyukov <dvyukov@...gle.com>
Cc: kadlec@...ckhole.kfki.hu, fw@...len.de, davem@...emloft.net,
netfilter-devel@...r.kernel.org, coreteam@...filter.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] netfilter: fix int overflow in xt_alloc_table_info()
On Thu, Dec 28, 2017 at 09:48:54AM +0100, Dmitry Vyukov wrote:
> syzkaller triggered OOM kills by passing ipt_replace.size = -1
> to IPT_SO_SET_REPLACE. The root cause is that SMP_ALIGN() in
> xt_alloc_table_info() causes int overflow and the size check passes
> when it should not. SMP_ALIGN() is no longer needed leftover.
>
> Remove SMP_ALIGN() call in xt_alloc_table_info().
Applied, thanks.
Powered by blists - more mailing lists