<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv4/netfilter, branch v2.6.19</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/ipv4/netfilter?h=v2.6.19</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/ipv4/netfilter?h=v2.6.19'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2006-11-29T04:59:38Z</updated>
<entry>
<title>[NETFILTER]: ipt_REJECT: fix memory corruption</title>
<updated>2006-11-29T04:59:38Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-29T04:10:21Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=af443b6d90de17f7630621269cf0610d9d772670'/>
<id>urn:sha1:af443b6d90de17f7630621269cf0610d9d772670</id>
<content type='text'>
On devices with hard_header_len &gt; LL_MAX_HEADER ip_route_me_harder()
reallocates the skb, leading to memory corruption when using the stale
tcph pointer to update the checksum.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: conntrack: fix refcount leak when finding expectation</title>
<updated>2006-11-29T04:59:37Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-11-27T18:26:46Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2e47c264a2e6ea24c27b4987607222202818c1f4'/>
<id>urn:sha1:2e47c264a2e6ea24c27b4987607222202818c1f4</id>
<content type='text'>
All users of __{ip,nf}_conntrack_expect_find() don't expect that
it increments the reference count of expectation.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: ctnetlink: fix reference count leak</title>
<updated>2006-11-29T04:59:36Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-27T18:26:25Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c537b75a3ba9f5d2569f313742cd379dff6ceb70'/>
<id>urn:sha1:c537b75a3ba9f5d2569f313742cd379dff6ceb70</id>
<content type='text'>
When NFA_NEST exceeds the skb size the protocol reference is leaked.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: H.323 conntrack: fix crash with CONFIG_IP_NF_CT_ACCT</title>
<updated>2006-11-25T23:16:47Z</updated>
<author>
<name>Faidon Liambotis</name>
<email>paravoid@debian.org</email>
</author>
<published>2006-11-22T05:46:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=38f7efd52c4f3f0b22c460eadbfe7c42f9ebff82'/>
<id>urn:sha1:38f7efd52c4f3f0b22c460eadbfe7c42f9ebff82</id>
<content type='text'>
H.323 connection tracking code calls ip_ct_refresh_acct() when
processing RCFs and URQs but passes NULL as the skb.
When CONFIG_IP_NF_CT_ACCT is enabled, the connection tracking core tries
to derefence the skb, which results in an obvious panic.
A similar fix was applied on the SIP connection tracking code some time
ago.

Signed-off-by: Faidon Liambotis &lt;paravoid@debian.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Use pskb_trim in {ip,ip6,nfnetlink}_queue</title>
<updated>2006-11-16T05:18:48Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-15T03:48:09Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d8a585d78efdf191a64ca655136ac1e49fd27cf4'/>
<id>urn:sha1:d8a585d78efdf191a64ca655136ac1e49fd27cf4</id>
<content type='text'>
Based on patch by James D. Nurmi:

I've got some code very dependant on nfnetlink_queue, and turned up a
large number of warns coming from skb_trim.  While it's quite possibly
my code, having not seen it on older kernels made me a bit suspect.

Anyhow, based on some googling I turned up this thread:
http://lkml.org/lkml/2006/8/13/56

And believe the issue to be related, so attached is a small patch to
the kernel -- not sure if this is completely correct, but for anyone
else hitting the WARN_ON(1) in skbuff.h, it might be helpful..

Signed-off-by: James D. Nurmi &lt;jdnurmi@gmail.com&gt;

Ported to ip6_queue and nfnetlink_queue and added return value
checks.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: ip_tables: compat code module refcounting fix</title>
<updated>2006-10-30T23:24:47Z</updated>
<author>
<name>Dmitry Mishin</name>
<email>dim@openvz.org</email>
</author>
<published>2006-10-30T23:14:27Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=920b868ae1dfdac77c5e8c97e7067b23680f043e'/>
<id>urn:sha1:920b868ae1dfdac77c5e8c97e7067b23680f043e</id>
<content type='text'>
This patch fixes bug in iptables modules refcounting on compat error way.

As we are getting modules in check_compat_entry_size_and_hooks(), in case of
later error, we should put them all in translate_compat_table(), not  in the
compat_copy_entry_from_user() or compat_copy_match_from_user(), as it is now.

Signed-off-by: Dmitry Mishin &lt;dim@openvz.org&gt;
Acked-by: Vasily Averin &lt;vvs@openvz.org&gt;
Acked-by: Kirill Korotaev &lt;dev@openvz.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: ip_tables: compat error way cleanup</title>
<updated>2006-10-30T23:24:45Z</updated>
<author>
<name>Vasily Averin</name>
<email>vvs@openvz.org</email>
</author>
<published>2006-10-30T23:13:28Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ef4512e76679b4f4997f60f93f8a576a0d20c26b'/>
<id>urn:sha1:ef4512e76679b4f4997f60f93f8a576a0d20c26b</id>
<content type='text'>
This patch adds forgotten compat_flush_offset() call to error way of
translate_compat_table().  May lead to table corruption on the next
compat_do_replace().

Signed-off-by: Vasily Averin &lt;vvs@openvz.org&gt;
Acked-by: Dmitry Mishin &lt;dim@openvz.org&gt;
Acked-by: Kirill Korotaev &lt;dev@openvz.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Missed and reordered checks in {arp,ip,ip6}_tables</title>
<updated>2006-10-30T23:24:44Z</updated>
<author>
<name>Dmitry Mishin</name>
<email>dim@openvz.org</email>
</author>
<published>2006-10-30T23:12:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=590bdf7fd2292b47c428111cb1360e312eff207e'/>
<id>urn:sha1:590bdf7fd2292b47c428111cb1360e312eff207e</id>
<content type='text'>
There is a number of issues in parsing user-provided table in
translate_table(). Malicious user with CAP_NET_ADMIN may crash system by
passing special-crafted table to the *_tables.

The first issue is that mark_source_chains() function is called before entry
content checks. In case of standard target, mark_source_chains() function
uses t-&gt;verdict field in order to determine new position. But the check, that
this field leads no further, than the table end, is in check_entry(), which
is called later, than mark_source_chains().

The second issue, that there is no check that target_offset points inside
entry. If so, *_ITERATE_MATCH macro will follow further, than the entry
ends. As a result, we'll have oops or memory disclosure.

And the third issue, that there is no check that the target is completely
inside entry. Results are the same, as in previous issue.

Signed-off-by: Dmitry Mishin &lt;dim@openvz.org&gt;
Acked-by: Kirill Korotaev &lt;dev@openvz.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: Missing check for CAP_NET_ADMIN in iptables compat layer</title>
<updated>2006-10-20T07:21:10Z</updated>
<author>
<name>Björn Steinbrink</name>
<email>B.Steinbrink@gmx.de</email>
</author>
<published>2006-10-20T07:21:10Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=82fac0542e11c0d3316cc8fdafd2a990d2aab692'/>
<id>urn:sha1:82fac0542e11c0d3316cc8fdafd2a990d2aab692</id>
<content type='text'>
The 32bit compatibility layer has no CAP_NET_ADMIN check in
compat_do_ipt_get_ctl, which for example allows to list the current
iptables rules even without having that capability (the non-compat
version requires it). Other capabilities might be required to exploit
the bug (eg. CAP_NET_RAW to get the nfnetlink socket?), so a plain user
can't exploit it, but a setup actually using the posix capability system
might very well hit such a constellation of granted capabilities.

Signed-off-by: Björn Steinbrink &lt;B.Steinbrink@gmx.de&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: ctnetlink: Remove debugging messages</title>
<updated>2006-10-16T06:14:11Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2006-10-12T21:09:16Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9ea8cfd6aa74e710f0cb0731ecb9dee53fbebfb9'/>
<id>urn:sha1:9ea8cfd6aa74e710f0cb0731ecb9dee53fbebfb9</id>
<content type='text'>
Remove (compilation-breaking) debugging messages introduced at early
development stage.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
