First published: Mon Mar 14 2016(Updated: )
In the mark_source_chains function (net/ipv4/netfilter/ip_tables.c) it is possible for a user-supplied ipt_entry structure to have a large next_offset field. This field is not bounds checked prior to writing a counter value at the supplied offset. Proposed fix: patch v1 message: <a href="http://marc.info/?l=netfilter-devel&m=145757134822741&w=2">http://marc.info/?l=netfilter-devel&m=145757134822741&w=2</a> patch v2 thread: <a href="http://marc.info/?t=145757149500006&r=1&w=2">http://marc.info/?t=145757149500006&r=1&w=2</a> patch v2 message: <a href="http://marc.info/?l=netfilter-devel&m=145762719008418&w=2">http://marc.info/?l=netfilter-devel&m=145762719008418&w=2</a> patch v2 thread: (none yet) <a href="http://marc.info/?l=netfilter-devel&r=4&b=201603&w=2">http://marc.info/?l=netfilter-devel&r=4&b=201603&w=2</a> CVE request and assignment: <a href="http://seclists.org/oss-sec/2016/q1/581">http://seclists.org/oss-sec/2016/q1/581</a> <a href="http://seclists.org/oss-sec/2016/q1/619">http://seclists.org/oss-sec/2016/q1/619</a> Audit done by netfilter team found several related bugs, patches to better validate rulesets are currently queued in pablos nf-next tree upstream (use "parent" link to cycle to next one - there are 17 additional patches): <a href="https://git.kernel.org/cgit/linux/kernel/git/pablo/nf-next.git/commit/?id=d7591f0c41ce3e67600a982bab6989ef0f07b3ce">https://git.kernel.org/cgit/linux/kernel/git/pablo/nf-next.git/commit/?id=d7591f0c41ce3e67600a982bab6989ef0f07b3ce</a>
Credit: meissner@suse.de security@opentext.com meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Suse Linux Enterprise Software Development Kit | =11.0-sp4 | |
Novell Suse Linux Enterprise Software Development Kit | =12.0 | |
Novell Suse Linux Enterprise Software Development Kit | =12.0-sp1 | |
Novell Suse Linux Enterprise Debuginfo | =11.0-sp4 | |
Novell Suse Linux Enterprise Desktop | =12.0 | |
Novell Suse Linux Enterprise Desktop | =12.0-sp1 | |
Novell Suse Linux Enterprise Live Patching | =12.0 | |
Novell Suse Linux Enterprise Module For Public Cloud | =12.0 | |
Novell Suse Linux Enterprise Real Time Extension | =12.0-sp1 | |
Novell Suse Linux Enterprise Server | =11.0-extra | |
Novell Suse Linux Enterprise Server | =11.0-sp4 | |
Novell Suse Linux Enterprise Server | =12.0 | |
Novell Suse Linux Enterprise Server | =12.0-sp1 | |
Novell Suse Linux Enterprise Workstation Extension | =12.0 | |
Novell Suse Linux Enterprise Workstation Extension | =12.0-sp1 | |
Linux Linux kernel | <=4.5.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.