* Please apply "netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user" to 3.18.y, 4.4.y, 4.9.y
@ 2018-09-13 18:02 Greg Hackmann
2018-09-17 11:43 ` Greg KH
0 siblings, 1 reply; 2+ messages in thread
From: Greg Hackmann @ 2018-09-13 18:02 UTC (permalink / raw)
To: stable
e466af75c074 ("netfilter: x_tables: avoid stack-out-of-bounds read in
xt_copy_counters_from_user") fixes an out-of-bounds read that happens
when a userspace-controlled value is not NULL terminated. It looks like
the fix was taken into 3.16.y but not kernels after it.
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Please apply "netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user" to 3.18.y, 4.4.y, 4.9.y
2018-09-13 18:02 Please apply "netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user" to 3.18.y, 4.4.y, 4.9.y Greg Hackmann
@ 2018-09-17 11:43 ` Greg KH
0 siblings, 0 replies; 2+ messages in thread
From: Greg KH @ 2018-09-17 11:43 UTC (permalink / raw)
To: Greg Hackmann; +Cc: stable
On Thu, Sep 13, 2018 at 11:02:29AM -0700, Greg Hackmann wrote:
> e466af75c074 ("netfilter: x_tables: avoid stack-out-of-bounds read in
> xt_copy_counters_from_user") fixes an out-of-bounds read that happens
> when a userspace-controlled value is not NULL terminated. It looks like
> the fix was taken into 3.16.y but not kernels after it.
Now queued up, thanks.
greg k-h
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-09-17 17:10 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-09-13 18:02 Please apply "netfilter: x_tables: avoid stack-out-of-bounds read in xt_copy_counters_from_user" to 3.18.y, 4.4.y, 4.9.y Greg Hackmann
2018-09-17 11:43 ` Greg KH
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.