<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv4/netfilter, branch v2.6.17</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/ipv4/netfilter?h=v2.6.17</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/ipv4/netfilter?h=v2.6.17'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2006-05-29T05:51:05Z</updated>
<entry>
<title>[NETFILTER]: PPTP helper: fix sstate/cstate typo</title>
<updated>2006-05-29T05:51:05Z</updated>
<author>
<name>Alexey Dobriyan</name>
<email>adobriyan@gmail.com</email>
</author>
<published>2006-05-29T05:51:05Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7114b0bb6df7b2db266ba4847e4dd8333fa98a9a'/>
<id>urn:sha1:7114b0bb6df7b2db266ba4847e4dd8333fa98a9a</id>
<content type='text'>
Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: mark H.323 helper experimental</title>
<updated>2006-05-29T05:50:40Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-05-29T05:50:40Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ca3ba88d0cf4b5d7a628caf505c231162dde9429'/>
<id>urn:sha1:ca3ba88d0cf4b5d7a628caf505c231162dde9429</id>
<content type='text'>
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Fix small information leak in SO_ORIGINAL_DST (CVE-2006-1343)</title>
<updated>2006-05-29T05:50:18Z</updated>
<author>
<name>Marcel Holtmann</name>
<email>marcel@holtmann.org</email>
</author>
<published>2006-05-29T05:50:18Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6c813c3fe9e30fcf3c4d94d2ba24108babd745b0'/>
<id>urn:sha1:6c813c3fe9e30fcf3c4d94d2ba24108babd745b0</id>
<content type='text'>
It appears that sockaddr_in.sin_zero is not zeroed during
getsockopt(...SO_ORIGINAL_DST...) operation. This can lead
to an information leak (CVE-2006-1343).

Signed-off-by: Marcel Holtmann &lt;marcel@holtmann.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: SNMP NAT: fix memleak in snmp_object_decode</title>
<updated>2006-05-23T22:15:13Z</updated>
<author>
<name>Chris Wright</name>
<email>chrisw@sous-sol.org</email>
</author>
<published>2006-05-23T22:08:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4a063739138e2c4e933188d641f1593e01ce8285'/>
<id>urn:sha1:4a063739138e2c4e933188d641f1593e01ce8285</id>
<content type='text'>
If kmalloc fails, error path leaks data allocated from asn1_oid_decode().

Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: H.323 helper: fix sequence extension parsing</title>
<updated>2006-05-23T22:15:10Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-05-23T22:07:46Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4d942d8b39bf7d43ce93d85964aeb63aeace0593'/>
<id>urn:sha1:4d942d8b39bf7d43ce93d85964aeb63aeace0593</id>
<content type='text'>
When parsing unknown sequence extensions the "son"-pointer points behind
the last known extension for this type, don't try to interpret it.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: H.323 helper: fix parser error propagation</title>
<updated>2006-05-23T22:15:08Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-05-23T22:07:07Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7185989db4d926dbef1a2f638c464f35599c83e0'/>
<id>urn:sha1:7185989db4d926dbef1a2f638c464f35599c83e0</id>
<content type='text'>
The condition "&gt; H323_ERROR_STOP" can never be true since H323_ERROR_STOP
is positive and is the highest possible return code, while real errors are
negative, fix the checks. Also only abort on real errors in some spots
that were just interpreting any return value != 0 as error.

Fixes crashes caused by use of stale data after a parsing error occured:

BUG: unable to handle kernel paging request at virtual address bfffffff
 printing eip:
c01aa0f8
*pde = 1a801067
*pte = 00000000
Oops: 0000 [#1]
PREEMPT
Modules linked in: ip_nat_h323 ip_conntrack_h323 nfsd exportfs sch_sfq sch_red cls_fw sch_hfsc  xt_length ipt_owner xt_MARK iptable_mangle nfs lockd sunrpc pppoe pppoxx
CPU:    0
EIP:    0060:[&lt;c01aa0f8&gt;]    Not tainted VLI
EFLAGS: 00210646   (2.6.17-rc4 #8)
EIP is at memmove+0x19/0x22
eax: d77264e9   ebx: d77264e9   ecx: e88d9b17   edx: d77264e9
esi: bfffffff   edi: bfffffff   ebp: de6a7680   esp: c0349db8
ds: 007b   es: 007b   ss: 0068
Process asterisk (pid: 3765, threadinfo=c0349000 task=da068540)
Stack: &lt;0&gt;00000006 c0349e5e d77264e3 e09a2b4e e09a38a0 d7726052 d7726124 00000491
       00000006 00000006 00000006 00000491 de6a7680 d772601e d7726032 c0349f74
       e09a2dc2 00000006 c0349e5e 00000006 00000000 d76dda28 00000491 c0349f74
Call Trace:
 [&lt;e09a2b4e&gt;] mangle_contents+0x62/0xfe [ip_nat]
 [&lt;e09a2dc2&gt;] ip_nat_mangle_tcp_packet+0xa1/0x191 [ip_nat]
 [&lt;e0a2712d&gt;] set_addr+0x74/0x14c [ip_nat_h323]
 [&lt;e0ad531e&gt;] process_setup+0x11b/0x29e [ip_conntrack_h323]
 [&lt;e0ad534f&gt;] process_setup+0x14c/0x29e [ip_conntrack_h323]
 [&lt;e0ad57bd&gt;] process_q931+0x3c/0x142 [ip_conntrack_h323]
 [&lt;e0ad5dff&gt;] q931_help+0xe0/0x144 [ip_conntrack_h323]
...

Found by the PROTOS c07-h2250v4 testsuite.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: SNMP NAT: fix memory corruption</title>
<updated>2006-05-22T23:55:14Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-05-22T23:55:14Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f41d5bb1d9f49b03af7126d07a511facbe283a92'/>
<id>urn:sha1:f41d5bb1d9f49b03af7126d07a511facbe283a92</id>
<content type='text'>
Fix memory corruption caused by snmp_trap_decode:

- When snmp_trap_decode fails before the id and address are allocated,
  the pointers contain random memory, but are freed by the caller
  (snmp_parse_mangle).

- When snmp_trap_decode fails after allocating just the ID, it tries
  to free both address and ID, but the address pointer still contains
  random memory. The caller frees both ID and random memory again.

- When snmp_trap_decode fails after allocating both, it frees both,
  and the callers frees both again.

The corruption can be triggered remotely when the ip_nat_snmp_basic
module is loaded and traffic on port 161 or 162 is NATed.

Found by multiple testcases of the trap-app and trap-enc groups of the
PROTOS c06-snmpv1 testsuite.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;</content>
</entry>
<entry>
<title>[NETFILTER]: Fix do_add_counters race, possible oops or info leak (CVE-2006-0039)</title>
<updated>2006-05-19T09:16:52Z</updated>
<author>
<name>Solar Designer</name>
<email>solar@openwall.com</email>
</author>
<published>2006-05-19T09:16:52Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2c8ac66bb2ff89e759f0d632a27cc64205e9ddd9'/>
<id>urn:sha1:2c8ac66bb2ff89e759f0d632a27cc64205e9ddd9</id>
<content type='text'>
Solar Designer found a race condition in do_add_counters(). The beginning
of paddc is supposed to be the same as tmp which was sanity-checked
above, but it might not be the same in reality. In case the integer
overflow and/or the race condition are triggered, paddc-&gt;num_counters
might not match the allocation size for paddc. If the check below
(t-&gt;private-&gt;number != paddc-&gt;num_counters) nevertheless passes (perhaps
this requires the race condition to be triggered), IPT_ENTRY_ITERATE()
would read kernel memory beyond the allocation size, potentially causing
an oops or leaking sensitive data (e.g., passwords from host system or
from another VPS) via counter increments. This requires CAP_NET_ADMIN.

Signed-off-by: Solar Designer &lt;solar@openwall.com&gt;
Signed-off-by: Kirill Korotaev &lt;dev@openvz.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: GRE conntrack: fix htons/htonl confusion</title>
<updated>2006-05-19T09:16:29Z</updated>
<author>
<name>Alexey Dobriyan</name>
<email>adobriyan@gmail.com</email>
</author>
<published>2006-05-19T09:16:29Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a467704dcb4fa45da48079486f1b0e6baffb12d2'/>
<id>urn:sha1:a467704dcb4fa45da48079486f1b0e6baffb12d2</id>
<content type='text'>
GRE keys are 16 bit.

Signed-off-by: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: fix format specifier for netfilter log targets</title>
<updated>2006-05-19T09:15:47Z</updated>
<author>
<name>Philip Craig</name>
<email>philipc@snapgear.com</email>
</author>
<published>2006-05-19T09:15:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5c170a09d9092e63af1658179f29867d32d56b55'/>
<id>urn:sha1:5c170a09d9092e63af1658179f29867d32d56b55</id>
<content type='text'>
The prefix argument for nf_log_packet is a format specifier,
so don't pass the user defined string directly to it.

Signed-off-by: Philip Craig &lt;philipc@snapgear.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
