bugzilla-daemon at netfilter.org
2021-Jan-15 16:35 UTC
[Bug 1492] New: Argument parsing buffer overflow in ipset_parse_argv
https://bugzilla.netfilter.org/show_bug.cgi?id=1492
Bug ID: 1492
Summary: Argument parsing buffer overflow in ipset_parse_argv
Product: ipset
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority: P5
Component: default
Assignee: netfilter-buglog at lists.netfilter.org
Reporter: marshallwhittaker at gmail.com
Created attachment 622
--> https://bugzilla.netfilter.org/attachment.cgi?id=622&action=edit
Core dump file from ipset
Trying to pass arguments via xargs to ipset I ran across a buffer overflow in
the argument parsing ipset_parse_argv function. I've reproduced this error
on
Manjaro and Ubuntu Linux systems. The error can be triggered by trying to add
more than 32 arguments (more than MAX_ARGS define) to the ipset command.
Example: ipset add a $(perl -e 'print "A "x64;')
Marshall / oxagast
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20210115/5989040e/attachment.html>
bugzilla-daemon at netfilter.org
2021-Jan-19 07:43 UTC
[Bug 1492] Argument parsing buffer overflow in ipset_parse_argv
https://bugzilla.netfilter.org/show_bug.cgi?id=1492
Jozsef Kadlecsik <kadlec at netfilter.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |FIXED
CC| |kadlec at netfilter.org
Status|NEW |RESOLVED
--- Comment #1 from Jozsef Kadlecsik <kadlec at netfilter.org> ---
Thanks for the report! The bug is fixed in the ipset git tree and there'll
be
a new ipset release in this week.
Jozsef
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20210119/0bf0ccea/attachment.html>