In the Linux kernel, the following vulnerability has been resolved:
netfilter: complete validation of user input
In my recent commit, I missed that do_replace() handlers use copy_from_sockptr() (which I fixed), followed by unsafe copy_from_sockptr_offset() calls.
In all functions, we can perform the @optlen validation before even calling xt_alloc_table_info() with the following check:
if ((u64)optlen < (u64)tmp.size + sizeof(tmp)) return -EINVAL;
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 5.15.154 | 5.15.156 |
| linux / linux_kernel | 6.1.85 | 6.1.87 |
| linux / linux_kernel | 6.6.26 | 6.6.28 |
| linux / linux_kernel | 6.8.5 | 6.8.7 |
| linux / linux_kernel | 5.10.215 | 5.10.215.x |
| linux / linux_kernel | 6.9-rc3 | 6.9-rc3.x |
| debian / debian_linux | 10.0 | 10.0.x |