bugzilla-daemon at netfilter.org
2021-Jan-15 16:35 UTC
[Bug 1492] New: Argument parsing buffer overflow in ipset_parse_argv
https://bugzilla.netfilter.org/show_bug.cgi?id=1492 Bug ID: 1492 Summary: Argument parsing buffer overflow in ipset_parse_argv Product: ipset Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: major Priority: P5 Component: default Assignee: netfilter-buglog at lists.netfilter.org Reporter: marshallwhittaker at gmail.com Created attachment 622 --> https://bugzilla.netfilter.org/attachment.cgi?id=622&action=edit Core dump file from ipset Trying to pass arguments via xargs to ipset I ran across a buffer overflow in the argument parsing ipset_parse_argv function. I've reproduced this error on Manjaro and Ubuntu Linux systems. The error can be triggered by trying to add more than 32 arguments (more than MAX_ARGS define) to the ipset command. Example: ipset add a $(perl -e 'print "A "x64;') Marshall / oxagast -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20210115/5989040e/attachment.html>
bugzilla-daemon at netfilter.org
2021-Jan-19 07:43 UTC
[Bug 1492] Argument parsing buffer overflow in ipset_parse_argv
https://bugzilla.netfilter.org/show_bug.cgi?id=1492 Jozsef Kadlecsik <kadlec at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED CC| |kadlec at netfilter.org Status|NEW |RESOLVED --- Comment #1 from Jozsef Kadlecsik <kadlec at netfilter.org> --- Thanks for the report! The bug is fixed in the ipset git tree and there'll be a new ipset release in this week. Jozsef -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20210119/0bf0ccea/attachment.html>