Florian Westphal <fw@xxxxxxxxx> wrote: > + if (strcmp(t->u.user.name, XT_STANDARD_TARGET) == 0 && > + target_offset + sizeof(struct xt_standard_target) > next_offset) > + return -EINVAL; The last hunk broke CONFIG_COMPAT, it calls into check_entry() and casts compat_Xt_entry to Xt_entry, but for compat case xt_standard_target is larger than what a 32bit userspace sends us. For now I'd suggest to not pass this to stable, I'll rework the compat handlers next week to fix this properly. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html