aboutsummaryrefslogtreecommitdiff
path: root/sys/gnu/fpemul/(public-mirror)
diff options
context:
space:
mode:
authorCy Schubert <cy@FreeBSD.org>2025-10-22 23:19:54 +0000
committerCy Schubert <cy@FreeBSD.org>2025-11-05 15:32:17 +0000
commitdf381bec2d2b73697a3d163177df042dd272022d (patch)
treeddc66e5d1d05a4fd9b51f215024b63eb393feb50 /sys/gnu/fpemul/(public-mirror)
parentf3b94f47f55c502e8983f9bd294e963e75b2963a (diff)
ipfilter: Don't trust userland supplied iph_sizeHEADmain
ipf_htable_create() trusts a user-supplied iph_size from iphtable_t and computes the allocation size as iph->iph_size * sizeof(*iph->iph_table) without checking for integer overflow. A sufficiently large iph_size causes the multiplication to wrap, resulting in an under-sized allocation for the table pointer array. Subsequent code (e.g., in ipf_htent_insert()) can then write past the end of the allocated buffer, corrupting kernel memory and causing DoS or potential privilege escalation. This is not typically a problem when using the ipfilter provided userland tools as calculate the correct lengths. This mitigates a rogue actor calling ipfilter ioctls directly. Reported by: Ilja Van Sprundel <ivansprundel@ioactive.com> Reviewed by: markj MFC after: 1 week Differential revision: https://reviews.freebsd.org/D53286
Diffstat (limited to 'sys/gnu/fpemul/(public-mirror)')
0 files changed, 0 insertions, 0 deletions